General
-
Target
7bbc50af11ca46a958cecb2898884860_NeikiAnalytics.exe
-
Size
765KB
-
Sample
240531-hpvhrsbd36
-
MD5
7bbc50af11ca46a958cecb2898884860
-
SHA1
3acad220a592a55cf544462bfa9cda995d62145c
-
SHA256
5579a050c744e49900d7e5d3cabbd61125a82da6bd7ff7e8e18f87fb50c2889e
-
SHA512
d8f3b5deb8550f91caceb50c6de2d9fe7384ea2a45ded5a27535784376f185fe22213efd78692f6a0e58cd5f9bb781fdd0cb5f7b1e54e60ff9b9299e1d553687
-
SSDEEP
12288:ChkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4a36Ph9y2d71YlRC:iRmJkcoQricOIQxiZY1ia0yY71YlE
Static task
static1
Behavioral task
behavioral1
Sample
7bbc50af11ca46a958cecb2898884860_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7bbc50af11ca46a958cecb2898884860_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
7bbc50af11ca46a958cecb2898884860_NeikiAnalytics.exe
-
Size
765KB
-
MD5
7bbc50af11ca46a958cecb2898884860
-
SHA1
3acad220a592a55cf544462bfa9cda995d62145c
-
SHA256
5579a050c744e49900d7e5d3cabbd61125a82da6bd7ff7e8e18f87fb50c2889e
-
SHA512
d8f3b5deb8550f91caceb50c6de2d9fe7384ea2a45ded5a27535784376f185fe22213efd78692f6a0e58cd5f9bb781fdd0cb5f7b1e54e60ff9b9299e1d553687
-
SSDEEP
12288:ChkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4a36Ph9y2d71YlRC:iRmJkcoQricOIQxiZY1ia0yY71YlE
Score10/10-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-