General
-
Target
38cfb0bf68e8bf0a222cc5c5efba96a0_NeikiAnalytics.exe
-
Size
718KB
-
Sample
240523-g5s47sgc6z
-
MD5
38cfb0bf68e8bf0a222cc5c5efba96a0
-
SHA1
8bb86ecb51e78d03d665343bde53f1e0f3fabeda
-
SHA256
0c1b68df17df62f9c3ca266aaac0e7f6f4baff3f9329235cb355c44e09d8ceff
-
SHA512
f88bbb9ff672180ed207d20c2c32a3bb920b65c14b37c38027dbd2d0c3a372dc689b4ac5cc7bf06018ff10f9fc9619a0801401050c03732cdb5499d308582fea
-
SSDEEP
12288:IfMXx1XvS+dDa+UT5RxDEoXwWOFe3rpHZH18nkLNiAmm/TKEJqypxUXIrRXgws0I:ZhS+d+fTRDEoUe7pHZUk5iAma3F0ICD0
Static task
static1
Behavioral task
behavioral1
Sample
38cfb0bf68e8bf0a222cc5c5efba96a0_NeikiAnalytics.exe
Resource
win7-20240215-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.cervezabaum.com - Port:
587 - Username:
[email protected] - Password:
36781193Baum - Email To:
[email protected]
Extracted
Protocol: smtp- Host:
mail.cervezabaum.com - Port:
587 - Username:
[email protected] - Password:
36781193Baum
Targets
-
-
Target
38cfb0bf68e8bf0a222cc5c5efba96a0_NeikiAnalytics.exe
-
Size
718KB
-
MD5
38cfb0bf68e8bf0a222cc5c5efba96a0
-
SHA1
8bb86ecb51e78d03d665343bde53f1e0f3fabeda
-
SHA256
0c1b68df17df62f9c3ca266aaac0e7f6f4baff3f9329235cb355c44e09d8ceff
-
SHA512
f88bbb9ff672180ed207d20c2c32a3bb920b65c14b37c38027dbd2d0c3a372dc689b4ac5cc7bf06018ff10f9fc9619a0801401050c03732cdb5499d308582fea
-
SSDEEP
12288:IfMXx1XvS+dDa+UT5RxDEoXwWOFe3rpHZH18nkLNiAmm/TKEJqypxUXIrRXgws0I:ZhS+d+fTRDEoUe7pHZUk5iAma3F0ICD0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-