General
-
Target
0c78a8d452b1217b0d5570bcc7aad820289550737a64e7ead9664d46315f1256_NeikiAnalytics.exe
-
Size
951KB
-
Sample
240621-1wz1yasdrb
-
MD5
bf0fc864d61c249258630b74a75864b0
-
SHA1
db968341e013b73af20365be041af8c1a66098a6
-
SHA256
0c78a8d452b1217b0d5570bcc7aad820289550737a64e7ead9664d46315f1256
-
SHA512
c37d092069638490071e215dc138f8f9b1a17f4fd9955b0c3931a4418e24f7d0a0bb07dfc94c354f338980b19bc31af3ad52bccc713e79e92a0786f9ae5f51d0
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5b:Rh+ZkldDPK8YaKjb
Static task
static1
Behavioral task
behavioral1
Sample
0c78a8d452b1217b0d5570bcc7aad820289550737a64e7ead9664d46315f1256_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0c78a8d452b1217b0d5570bcc7aad820289550737a64e7ead9664d46315f1256_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
0c78a8d452b1217b0d5570bcc7aad820289550737a64e7ead9664d46315f1256_NeikiAnalytics.exe
-
Size
951KB
-
MD5
bf0fc864d61c249258630b74a75864b0
-
SHA1
db968341e013b73af20365be041af8c1a66098a6
-
SHA256
0c78a8d452b1217b0d5570bcc7aad820289550737a64e7ead9664d46315f1256
-
SHA512
c37d092069638490071e215dc138f8f9b1a17f4fd9955b0c3931a4418e24f7d0a0bb07dfc94c354f338980b19bc31af3ad52bccc713e79e92a0786f9ae5f51d0
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5b:Rh+ZkldDPK8YaKjb
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-