General

  • Target

    343d30e3dc3a0fdb71239120da72a750_NeikiAnalytics.exe

  • Size

    52KB

  • MD5

    343d30e3dc3a0fdb71239120da72a750

  • SHA1

    0a7858b36dd6e1c0adcac05325d13ad2e858bc18

  • SHA256

    2668e61945a9f41964c8fdf1675a4e44348883e35b5bdef9d0584b44b6a6c929

  • SHA512

    645a0b05a7ec69d6306ed4ce8a4d41fee73b34c3572e93c08a6cd4a97de7a9b911cde9b399412681364956847ab3148aeb85e0e322d70444ff6040c0079d0305

  • SSDEEP

    768:B9n7mxUzILWCaS+DimpkHigW8Ybugdn4+6vEgK/J/r8OVc6KN:B97AKWmpkczbRd4rnkJD8OVclN

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:8080

127.0.0.1:13857

0.tcp.eu.ngrok.io:8080

0.tcp.eu.ngrok.io:13857

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    true

  • install_file

    DriveManagerFix.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 343d30e3dc3a0fdb71239120da72a750_NeikiAnalytics.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections