General
-
Target
c20c7132043488b5b58394c3a8b65060_NeikiAnalytics.exe
-
Size
1.9MB
-
Sample
240615-3bwtwsshjn
-
MD5
c20c7132043488b5b58394c3a8b65060
-
SHA1
342ea0777384c14dc201df2fbc9274b7db3de9df
-
SHA256
78297499183ade5301017f837baff3e0c4a5e6562c3918ea532caa23d3847944
-
SHA512
cdf362b9be57a7f4d938c46024c8ce4cc6590203971e3278417d515d2f9873fccfdccdbdb7157f2dc4f3bffb700266edf7309dac16f69b1891441aab21223e0a
-
SSDEEP
49152:zsC/lYEBYLsEAQACR07Q3byRD8aXY658:zsCdYEByfAw07QLyLn
Static task
static1
Behavioral task
behavioral1
Sample
c20c7132043488b5b58394c3a8b65060_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Targets
-
-
Target
c20c7132043488b5b58394c3a8b65060_NeikiAnalytics.exe
-
Size
1.9MB
-
MD5
c20c7132043488b5b58394c3a8b65060
-
SHA1
342ea0777384c14dc201df2fbc9274b7db3de9df
-
SHA256
78297499183ade5301017f837baff3e0c4a5e6562c3918ea532caa23d3847944
-
SHA512
cdf362b9be57a7f4d938c46024c8ce4cc6590203971e3278417d515d2f9873fccfdccdbdb7157f2dc4f3bffb700266edf7309dac16f69b1891441aab21223e0a
-
SSDEEP
49152:zsC/lYEBYLsEAQACR07Q3byRD8aXY658:zsCdYEByfAw07QLyLn
-
Detect Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-