General
-
Target
36ed60ead1e4fd048b8869db3f858aa4ae4161c16855169a67863e1d7de9b0d8_NeikiAnalytics.exe
-
Size
903KB
-
Sample
240623-ejvpsssgqk
-
MD5
c419e7c3d33d288d342a68d910a1bcc0
-
SHA1
a72e2a8b001e8165f6c320aaec87500369d3b73d
-
SHA256
36ed60ead1e4fd048b8869db3f858aa4ae4161c16855169a67863e1d7de9b0d8
-
SHA512
f5236898fb2fef204b61263c5b9c09ccdfec0827e4425a25c1d8222a19f58eab94aacb32ad403dace65a3e57c054489e530318ae9a0a46284bf12d379e49ae87
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5z:gh+ZkldoPK8YaKGz
Static task
static1
Behavioral task
behavioral1
Sample
36ed60ead1e4fd048b8869db3f858aa4ae4161c16855169a67863e1d7de9b0d8_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
36ed60ead1e4fd048b8869db3f858aa4ae4161c16855169a67863e1d7de9b0d8_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
36ed60ead1e4fd048b8869db3f858aa4ae4161c16855169a67863e1d7de9b0d8_NeikiAnalytics.exe
-
Size
903KB
-
MD5
c419e7c3d33d288d342a68d910a1bcc0
-
SHA1
a72e2a8b001e8165f6c320aaec87500369d3b73d
-
SHA256
36ed60ead1e4fd048b8869db3f858aa4ae4161c16855169a67863e1d7de9b0d8
-
SHA512
f5236898fb2fef204b61263c5b9c09ccdfec0827e4425a25c1d8222a19f58eab94aacb32ad403dace65a3e57c054489e530318ae9a0a46284bf12d379e49ae87
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5z:gh+ZkldoPK8YaKGz
Score10/10-
Drops startup file
-
Suspicious use of SetThreadContext
-