General
-
Target
5e805c0f561b4c6af622e205da3899d0_NeikiAnalytics.exe
-
Size
721KB
-
Sample
240530-brp8haac66
-
MD5
5e805c0f561b4c6af622e205da3899d0
-
SHA1
ddb8659115e8f0a5229a6d746cabb241be53ccad
-
SHA256
f0b3964229a3681754135920610ccc939270e67c366e434b66fa9ff1cbd1aaf6
-
SHA512
e09c142c3723e3cbbf3ce3e07fa861a77651d40818b160f8996e665f7a3287e32c45589505de6e86eeb40cb0ab38ab652d1f71c7a5cb04b6125167f6b372a239
-
SSDEEP
12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75e:arl6kD68JmloO7TdNaPymUi63i62xHLK
Behavioral task
behavioral1
Sample
5e805c0f561b4c6af622e205da3899d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e805c0f561b4c6af622e205da3899d0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
azorult
http://185.79.156.23/j0n0/index.php
Targets
-
-
Target
5e805c0f561b4c6af622e205da3899d0_NeikiAnalytics.exe
-
Size
721KB
-
MD5
5e805c0f561b4c6af622e205da3899d0
-
SHA1
ddb8659115e8f0a5229a6d746cabb241be53ccad
-
SHA256
f0b3964229a3681754135920610ccc939270e67c366e434b66fa9ff1cbd1aaf6
-
SHA512
e09c142c3723e3cbbf3ce3e07fa861a77651d40818b160f8996e665f7a3287e32c45589505de6e86eeb40cb0ab38ab652d1f71c7a5cb04b6125167f6b372a239
-
SSDEEP
12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75e:arl6kD68JmloO7TdNaPymUi63i62xHLK
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-