General
-
Target
886c5cd92564c7443bdad596b9cf7ff0_NeikiAnalytics.exe
-
Size
721KB
-
Sample
240601-bz9l4sdb61
-
MD5
886c5cd92564c7443bdad596b9cf7ff0
-
SHA1
c023b51219a176b5682384a254977e144f3e5a41
-
SHA256
f0ff2f423e2be0ed0733cd81bd8a6682fd17e9bc7b55a0da3161efa84d452396
-
SHA512
ba3d7e5c2c6d86fe2b1d2095a80ac9fc10ca40318f259260ee0ac3e92847e7d9d3d25be3572abc9fa7a4f42207e25deaf45398f9a403152ffa92bb6f980c3cf1
-
SSDEEP
12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75s:arl6kD68JmloO7TdNaPymUi63i62xHL4
Behavioral task
behavioral1
Sample
886c5cd92564c7443bdad596b9cf7ff0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
886c5cd92564c7443bdad596b9cf7ff0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
azorult
http://185.79.156.23/j0n0/index.php
Targets
-
-
Target
886c5cd92564c7443bdad596b9cf7ff0_NeikiAnalytics.exe
-
Size
721KB
-
MD5
886c5cd92564c7443bdad596b9cf7ff0
-
SHA1
c023b51219a176b5682384a254977e144f3e5a41
-
SHA256
f0ff2f423e2be0ed0733cd81bd8a6682fd17e9bc7b55a0da3161efa84d452396
-
SHA512
ba3d7e5c2c6d86fe2b1d2095a80ac9fc10ca40318f259260ee0ac3e92847e7d9d3d25be3572abc9fa7a4f42207e25deaf45398f9a403152ffa92bb6f980c3cf1
-
SSDEEP
12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75s:arl6kD68JmloO7TdNaPymUi63i62xHL4
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-