General
-
Target
933c2f83027822fa393730675bb57710_NeikiAnalytics.exe
-
Size
2.0MB
-
Sample
240522-yssrcaee5s
-
MD5
933c2f83027822fa393730675bb57710
-
SHA1
bc2af8503aa395569b34daa0ed241c3141866fdb
-
SHA256
b5bb0722c59a5dc74204c55bc8eeb1a3b70bd6422a6e44485770c0cb159d8d8f
-
SHA512
af22f6ee61b94ff895b202787a90f387792ed3bc5092a26d0ae23a4ef4bf0ab91de377498a46860986a46729c1c165ca764185f8a5e85b6e7cb534d0188c63d8
-
SSDEEP
49152:IFno/jf4JtTF+TxMoxc1TU+j+dAzGkiT:IFno/jwtIuoITsdZT
Static task
static1
Behavioral task
behavioral1
Sample
933c2f83027822fa393730675bb57710_NeikiAnalytics.exe
Resource
win7-20240220-en
Malware Config
Extracted
stealc
Targets
-
-
Target
933c2f83027822fa393730675bb57710_NeikiAnalytics.exe
-
Size
2.0MB
-
MD5
933c2f83027822fa393730675bb57710
-
SHA1
bc2af8503aa395569b34daa0ed241c3141866fdb
-
SHA256
b5bb0722c59a5dc74204c55bc8eeb1a3b70bd6422a6e44485770c0cb159d8d8f
-
SHA512
af22f6ee61b94ff895b202787a90f387792ed3bc5092a26d0ae23a4ef4bf0ab91de377498a46860986a46729c1c165ca764185f8a5e85b6e7cb534d0188c63d8
-
SSDEEP
49152:IFno/jf4JtTF+TxMoxc1TU+j+dAzGkiT:IFno/jwtIuoITsdZT
-
Detect Vidar Stealer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-