General
-
Target
0c9d62335c53a76df0bdec0bc243d5b0_NeikiAnalytics.exe
-
Size
3.1MB
-
Sample
240527-ll38aafc7x
-
MD5
0c9d62335c53a76df0bdec0bc243d5b0
-
SHA1
691c9d535f8942a9489e0baae271463443a5d298
-
SHA256
65bd56cfb876a9f4399e311f253ed83d45f7fed896eeba9f9c2dc7b6eb26d3f2
-
SHA512
4376bfe437defbf0e350b7220c7995a16cf0161881500f0ba7faae371afe5f4aef71858231d8f7b201381ff1c6c06adc132a72db578980019281536112c3b1c8
-
SSDEEP
49152:SvWI22SsaNYfdPBldt698dBcjHduRJ6KbR3LoGdfTHHB72eh2NT:Sv722SsaNYfdPBldt6+dBcjHduRJ6k
Behavioral task
behavioral1
Sample
0c9d62335c53a76df0bdec0bc243d5b0_NeikiAnalytics.exe
Resource
win7-20240419-en
Malware Config
Extracted
quasar
1.4.1
Office04
26.27.32.75:4782
0cfc6260-9d2e-4af5-9d5c-36502e10581d
-
encryption_key
812D564FEDCE5BAF795823ACE48DC125C79FF0F6
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
0c9d62335c53a76df0bdec0bc243d5b0_NeikiAnalytics.exe
-
Size
3.1MB
-
MD5
0c9d62335c53a76df0bdec0bc243d5b0
-
SHA1
691c9d535f8942a9489e0baae271463443a5d298
-
SHA256
65bd56cfb876a9f4399e311f253ed83d45f7fed896eeba9f9c2dc7b6eb26d3f2
-
SHA512
4376bfe437defbf0e350b7220c7995a16cf0161881500f0ba7faae371afe5f4aef71858231d8f7b201381ff1c6c06adc132a72db578980019281536112c3b1c8
-
SSDEEP
49152:SvWI22SsaNYfdPBldt698dBcjHduRJ6KbR3LoGdfTHHB72eh2NT:Sv722SsaNYfdPBldt6+dBcjHduRJ6k
-
Quasar payload
-
Executes dropped EXE
-