General
-
Target
07a2fb20a014cd15f034a5ddd37fafd0_NeikiAnalytics.exe
-
Size
1.1MB
-
Sample
240526-2bttvsfb96
-
MD5
07a2fb20a014cd15f034a5ddd37fafd0
-
SHA1
28c9cc9c5a2126294746ca62e7302cbfe021544c
-
SHA256
c9df285477a2a0ef5ea934a5c3b0f94983e202aa82460e900fa203292ccab0b6
-
SHA512
89ccc247b401e0282842c9c76f2c37b60e343ecacdfc3d58cfd4b613500a49f1794e0a091120fd9e8050dc794e9ae616e62d5228d30a4f91c2bf2987b0413039
-
SSDEEP
24576:4mtwzzxFGaZtqS2xS65L36YPxpPj5LzXqliOzR:4mePxDqS2EvYPxp5Lzui
Static task
static1
Behavioral task
behavioral1
Sample
07a2fb20a014cd15f034a5ddd37fafd0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
07a2fb20a014cd15f034a5ddd37fafd0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
warzonerat
thebeast415.duckdns.org:4036
Targets
-
-
Target
07a2fb20a014cd15f034a5ddd37fafd0_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
07a2fb20a014cd15f034a5ddd37fafd0
-
SHA1
28c9cc9c5a2126294746ca62e7302cbfe021544c
-
SHA256
c9df285477a2a0ef5ea934a5c3b0f94983e202aa82460e900fa203292ccab0b6
-
SHA512
89ccc247b401e0282842c9c76f2c37b60e343ecacdfc3d58cfd4b613500a49f1794e0a091120fd9e8050dc794e9ae616e62d5228d30a4f91c2bf2987b0413039
-
SSDEEP
24576:4mtwzzxFGaZtqS2xS65L36YPxpPj5LzXqliOzR:4mePxDqS2EvYPxp5Lzui
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-