General
-
Target
3f1b7ec8bdee408951c0b30718f0ea9d35ab8ec0055e968f2ec920b016579a04_NeikiAnalytics.exe
-
Size
520KB
-
Sample
240621-fgc8eaycpb
-
MD5
d6391426a97ff6e59b82c0ee01f02ba0
-
SHA1
8e00679d1e754f67a1fb97f67248e27904fecd4c
-
SHA256
3f1b7ec8bdee408951c0b30718f0ea9d35ab8ec0055e968f2ec920b016579a04
-
SHA512
0b7eb2159711d36b66dcd867fb9c2500210388d9d6de69a1e4542d41a592fddc665847e9d4983d95bcdd8061eabd717d8beea8e9758c350c3aba940efc167a18
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbI:f9fC3hh29Ya77A90aFtDfT5IMbI
Static task
static1
Behavioral task
behavioral1
Sample
3f1b7ec8bdee408951c0b30718f0ea9d35ab8ec0055e968f2ec920b016579a04_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f1b7ec8bdee408951c0b30718f0ea9d35ab8ec0055e968f2ec920b016579a04_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
darkcomet
PrivateEye
ratblackshades.no-ip.biz:1604
DC_MUTEX-ACC1R98
-
gencode
8GG5LVVGljSF
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
3f1b7ec8bdee408951c0b30718f0ea9d35ab8ec0055e968f2ec920b016579a04_NeikiAnalytics.exe
-
Size
520KB
-
MD5
d6391426a97ff6e59b82c0ee01f02ba0
-
SHA1
8e00679d1e754f67a1fb97f67248e27904fecd4c
-
SHA256
3f1b7ec8bdee408951c0b30718f0ea9d35ab8ec0055e968f2ec920b016579a04
-
SHA512
0b7eb2159711d36b66dcd867fb9c2500210388d9d6de69a1e4542d41a592fddc665847e9d4983d95bcdd8061eabd717d8beea8e9758c350c3aba940efc167a18
-
SSDEEP
6144:f9GGo2CwtGg6eeihEfph2CMvvqqSaYwpncOeC66AOa0aFtVEQfTo1ozVqMbI:f9fC3hh29Ya77A90aFtDfT5IMbI
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-