General
-
Target
017cf1bd7bac1cd2c0c26b194dc46f60_NeikiAnalytics.exe
-
Size
1.2MB
-
Sample
240526-zv4gasca5t
-
MD5
017cf1bd7bac1cd2c0c26b194dc46f60
-
SHA1
769a4b2d08f0731da988901de805867b54cdfdde
-
SHA256
54371f146852c449016d49ddcf330bd1ec45dc8ef48f304bba19aad34118792b
-
SHA512
a8eb82e187926a8a7c4cac838cc6de5502f747f88ea5185af52d6c40f48b0d6efc44829ca8e490da48a61a5f0d5a33ffef7fb37248306ce611524b3218e15866
-
SSDEEP
24576:mu6J33O0c+JY5UZ+XC0kGsoTGcK7YBaPymUi63i62xHLVFvtWYeF:ou0c++OCvkGsEGcK8BufT5LVuYK
Static task
static1
Behavioral task
behavioral1
Sample
017cf1bd7bac1cd2c0c26b194dc46f60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
017cf1bd7bac1cd2c0c26b194dc46f60_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
azorult
http://185.79.156.23/j0n0/index.php
Targets
-
-
Target
017cf1bd7bac1cd2c0c26b194dc46f60_NeikiAnalytics.exe
-
Size
1.2MB
-
MD5
017cf1bd7bac1cd2c0c26b194dc46f60
-
SHA1
769a4b2d08f0731da988901de805867b54cdfdde
-
SHA256
54371f146852c449016d49ddcf330bd1ec45dc8ef48f304bba19aad34118792b
-
SHA512
a8eb82e187926a8a7c4cac838cc6de5502f747f88ea5185af52d6c40f48b0d6efc44829ca8e490da48a61a5f0d5a33ffef7fb37248306ce611524b3218e15866
-
SSDEEP
24576:mu6J33O0c+JY5UZ+XC0kGsoTGcK7YBaPymUi63i62xHLVFvtWYeF:ou0c++OCvkGsEGcK8BufT5LVuYK
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-