General
-
Target
1c09e6ea24f8d16156b606b63c608a30_NeikiAnalytics.exe
-
Size
2.5MB
-
Sample
240612-ec2vjazfpc
-
MD5
1c09e6ea24f8d16156b606b63c608a30
-
SHA1
656b980fa347305f65ddf2de317da0d534244b0d
-
SHA256
d9d15087b5a4839fdb1f4955f37cc16259784e0295784116e1e50d7d0115f009
-
SHA512
980c6f2e724542fdbb93da689713c9c1bf6339d50f87bca7a70d4e9f9547e7d7451aa47f202bbc59d26e8856b6fac8f9ca93fd3acf7ce341c33bc10f8ba9a3d8
-
SSDEEP
49152:Zcm4081qpZBUbHEmJIsEAQACR07Q3byRD8aXY658:ZcmmqvBUbHtKfAw07QLyLn
Static task
static1
Behavioral task
behavioral1
Sample
1c09e6ea24f8d16156b606b63c608a30_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
1c09e6ea24f8d16156b606b63c608a30_NeikiAnalytics.exe
-
Size
2.5MB
-
MD5
1c09e6ea24f8d16156b606b63c608a30
-
SHA1
656b980fa347305f65ddf2de317da0d534244b0d
-
SHA256
d9d15087b5a4839fdb1f4955f37cc16259784e0295784116e1e50d7d0115f009
-
SHA512
980c6f2e724542fdbb93da689713c9c1bf6339d50f87bca7a70d4e9f9547e7d7451aa47f202bbc59d26e8856b6fac8f9ca93fd3acf7ce341c33bc10f8ba9a3d8
-
SSDEEP
49152:Zcm4081qpZBUbHEmJIsEAQACR07Q3byRD8aXY658:ZcmmqvBUbHtKfAw07QLyLn
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-