General
-
Target
328b5794a1aab4c021760105dee345b5aea60024497a40e77fb379d9e1ec9fa5_NeikiAnalytics.exe
-
Size
951KB
-
Sample
240623-drtxss1gln
-
MD5
d84d530414c37f30600c1ccce1ab3d40
-
SHA1
9523d04d1a1d01c8312dd6e4dc16e77ae2a87e0a
-
SHA256
328b5794a1aab4c021760105dee345b5aea60024497a40e77fb379d9e1ec9fa5
-
SHA512
4f6eb9f2150eb5d701c4db23a9e539a68f74d5c98e49718603c9a5f72a850f139595e35363378a48cb0cdb2a447ba65cce0bd02b922d12c5fc2cf55835d7beff
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5u:Rh+ZkldDPK8YaKju
Static task
static1
Behavioral task
behavioral1
Sample
328b5794a1aab4c021760105dee345b5aea60024497a40e77fb379d9e1ec9fa5_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
328b5794a1aab4c021760105dee345b5aea60024497a40e77fb379d9e1ec9fa5_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
328b5794a1aab4c021760105dee345b5aea60024497a40e77fb379d9e1ec9fa5_NeikiAnalytics.exe
-
Size
951KB
-
MD5
d84d530414c37f30600c1ccce1ab3d40
-
SHA1
9523d04d1a1d01c8312dd6e4dc16e77ae2a87e0a
-
SHA256
328b5794a1aab4c021760105dee345b5aea60024497a40e77fb379d9e1ec9fa5
-
SHA512
4f6eb9f2150eb5d701c4db23a9e539a68f74d5c98e49718603c9a5f72a850f139595e35363378a48cb0cdb2a447ba65cce0bd02b922d12c5fc2cf55835d7beff
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5u:Rh+ZkldDPK8YaKju
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-