General
-
Target
7348c2abc4cc4044fc93214fb87a9cd0_NeikiAnalytics.exe
-
Size
951KB
-
Sample
240525-b64z7sac6z
-
MD5
7348c2abc4cc4044fc93214fb87a9cd0
-
SHA1
8d3664181ad3889d69b1e515322d563116bc745d
-
SHA256
0297429c8ebec865fb090e5aa0aa643dbc37f2de108157d010e36020297db78c
-
SHA512
25296defd07186e64e8044433d40c971f6e535372ccc2dda916bc8afe182d06be222853519fe584bf9c2a71721181dab031699a9127c1b9a2ea9791c8510bd87
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5C:Rh+ZkldDPK8YaKjC
Static task
static1
Behavioral task
behavioral1
Sample
7348c2abc4cc4044fc93214fb87a9cd0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7348c2abc4cc4044fc93214fb87a9cd0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
7348c2abc4cc4044fc93214fb87a9cd0_NeikiAnalytics.exe
-
Size
951KB
-
MD5
7348c2abc4cc4044fc93214fb87a9cd0
-
SHA1
8d3664181ad3889d69b1e515322d563116bc745d
-
SHA256
0297429c8ebec865fb090e5aa0aa643dbc37f2de108157d010e36020297db78c
-
SHA512
25296defd07186e64e8044433d40c971f6e535372ccc2dda916bc8afe182d06be222853519fe584bf9c2a71721181dab031699a9127c1b9a2ea9791c8510bd87
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5C:Rh+ZkldDPK8YaKjC
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-