Behavioral task
behavioral1
Sample
c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe
-
Size
348KB
-
MD5
c15c7a39a36c7934a34a21bf0fb61d60
-
SHA1
b2a852d1ab8d615a2148a0966ac431e7979ded24
-
SHA256
7074ba04d9224b5b634c83510e09c9a3824eca919984186d897b62a47cbab32e
-
SHA512
426c17406e2c0c39f44d6873a6e7f04b9023d8b6043e8709f44e2fbbffba616f0b54518881218796be5f61a1347494d4ac39706d3187142289aa08eec53ac362
-
SSDEEP
6144:wGL3HRsM+OFZccgudb/bb1ORKSeB5L44BXFOx:vVP+MeEbARKSe/4AXkx
Malware Config
Extracted
quasar
1.3.0.0
rocket
pelopeloso-28110.portmap.host:28110
QSR_MUTEX_lGskyXvo8eJwQIPZAp
-
encryption_key
pjvltvhGpK5sPBq1UEXa
-
install_name
agentdatahelper.exe
-
log_directory
Logs
-
reconnect_delay
1
-
startup_key
Kernel32
-
subdirectory
WinDataCenter
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe
Files
-
c15c7a39a36c7934a34a21bf0fb61d60_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 345KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ