General
-
Target
03a85b7398362f995a6e6cbb51a6a190d3aa841a907fcaa3647cdab8c9d77df8_NeikiAnalytics.exe
-
Size
951KB
-
Sample
240619-x989zssglk
-
MD5
024938e6a6cda66ccf2c532080ee4430
-
SHA1
fc05750dde603ccb6ab003c8e3d385218e03e633
-
SHA256
03a85b7398362f995a6e6cbb51a6a190d3aa841a907fcaa3647cdab8c9d77df8
-
SHA512
e9ef56f857fbbb0009c2d543f5c37e00547329cabcfc3574e31fd58ab4b2758fcb2027d30e342c1017f14df892a74c08c115eaf823b4ff5c27609015d00550b4
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT53:Rh+ZkldDPK8YaKj3
Static task
static1
Behavioral task
behavioral1
Sample
03a85b7398362f995a6e6cbb51a6a190d3aa841a907fcaa3647cdab8c9d77df8_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03a85b7398362f995a6e6cbb51a6a190d3aa841a907fcaa3647cdab8c9d77df8_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
03a85b7398362f995a6e6cbb51a6a190d3aa841a907fcaa3647cdab8c9d77df8_NeikiAnalytics.exe
-
Size
951KB
-
MD5
024938e6a6cda66ccf2c532080ee4430
-
SHA1
fc05750dde603ccb6ab003c8e3d385218e03e633
-
SHA256
03a85b7398362f995a6e6cbb51a6a190d3aa841a907fcaa3647cdab8c9d77df8
-
SHA512
e9ef56f857fbbb0009c2d543f5c37e00547329cabcfc3574e31fd58ab4b2758fcb2027d30e342c1017f14df892a74c08c115eaf823b4ff5c27609015d00550b4
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT53:Rh+ZkldDPK8YaKj3
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-