General
-
Target
4c5168b1fc3c19269b4a0b4169efcef0_NeikiAnalytics.exe
-
Size
47KB
-
Sample
240607-l2v7lsff54
-
MD5
4c5168b1fc3c19269b4a0b4169efcef0
-
SHA1
25cc8589db2cc5994016c3104572ff678f4f2dae
-
SHA256
bde581b04681da7683f1830c359b87a0484d36633956fd39f0125a8e9b7f2254
-
SHA512
dab29e52ecda3de1f3e3e3857801a43680e085b53daf47ea405caf5079b05a5849c16950bcd745646f89f4e4c48d1a8cfea6cff030903ed700efcf1ec5f95f6b
-
SSDEEP
768:IuYC9T3kH1jWUvTqRmo2qb6ot3ubOgAfxzb0PI7f6J0bWuxtMbaY7dxF/vqBDZox:IuYC9T34y2YoOgAf77yubW4waMxV0dox
Behavioral task
behavioral1
Sample
4c5168b1fc3c19269b4a0b4169efcef0_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:883
QAYVOGQLOpKd
-
delay
3
-
install
true
-
install_file
flash btc (core network).exe
-
install_folder
%AppData%
Targets
-
-
Target
4c5168b1fc3c19269b4a0b4169efcef0_NeikiAnalytics.exe
-
Size
47KB
-
MD5
4c5168b1fc3c19269b4a0b4169efcef0
-
SHA1
25cc8589db2cc5994016c3104572ff678f4f2dae
-
SHA256
bde581b04681da7683f1830c359b87a0484d36633956fd39f0125a8e9b7f2254
-
SHA512
dab29e52ecda3de1f3e3e3857801a43680e085b53daf47ea405caf5079b05a5849c16950bcd745646f89f4e4c48d1a8cfea6cff030903ed700efcf1ec5f95f6b
-
SSDEEP
768:IuYC9T3kH1jWUvTqRmo2qb6ot3ubOgAfxzb0PI7f6J0bWuxtMbaY7dxF/vqBDZox:IuYC9T34y2YoOgAf77yubW4waMxV0dox
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-