General

  • Target

    886c5cd92564c7443bdad596b9cf7ff0_NeikiAnalytics.exe

  • Size

    721KB

  • Sample

    240601-bz9l4sdb61

  • MD5

    886c5cd92564c7443bdad596b9cf7ff0

  • SHA1

    c023b51219a176b5682384a254977e144f3e5a41

  • SHA256

    f0ff2f423e2be0ed0733cd81bd8a6682fd17e9bc7b55a0da3161efa84d452396

  • SHA512

    ba3d7e5c2c6d86fe2b1d2095a80ac9fc10ca40318f259260ee0ac3e92847e7d9d3d25be3572abc9fa7a4f42207e25deaf45398f9a403152ffa92bb6f980c3cf1

  • SSDEEP

    12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75s:arl6kD68JmloO7TdNaPymUi63i62xHL4

Malware Config

Extracted

Family

azorult

C2

http://185.79.156.23/j0n0/index.php

Targets

    • Target

      886c5cd92564c7443bdad596b9cf7ff0_NeikiAnalytics.exe

    • Size

      721KB

    • MD5

      886c5cd92564c7443bdad596b9cf7ff0

    • SHA1

      c023b51219a176b5682384a254977e144f3e5a41

    • SHA256

      f0ff2f423e2be0ed0733cd81bd8a6682fd17e9bc7b55a0da3161efa84d452396

    • SHA512

      ba3d7e5c2c6d86fe2b1d2095a80ac9fc10ca40318f259260ee0ac3e92847e7d9d3d25be3572abc9fa7a4f42207e25deaf45398f9a403152ffa92bb6f980c3cf1

    • SSDEEP

      12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75s:arl6kD68JmloO7TdNaPymUi63i62xHL4

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks