General
-
Target
1ac777a4f61e152cdc7ec28c18c91351b0d18caaddfac3d261aab788bafa4504_NeikiAnalytics.exe
-
Size
903KB
-
Sample
240626-1885dazeln
-
MD5
d39d8d04be6d49a49e68c172cdcdd730
-
SHA1
06d93db8f5877ac3ceb1db784a328e37dd4e0c17
-
SHA256
1ac777a4f61e152cdc7ec28c18c91351b0d18caaddfac3d261aab788bafa4504
-
SHA512
21d8d4c4493d5acce32b2422f0ad710966379135a74d16a72b8804102d1f0f7848f6c1451bcf5208310db09e7806f70c254110b8e4217439810c11ad5ec9162f
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5/:gh+ZkldoPK8YaKG/
Static task
static1
Behavioral task
behavioral1
Sample
1ac777a4f61e152cdc7ec28c18c91351b0d18caaddfac3d261aab788bafa4504_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1ac777a4f61e152cdc7ec28c18c91351b0d18caaddfac3d261aab788bafa4504_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
1ac777a4f61e152cdc7ec28c18c91351b0d18caaddfac3d261aab788bafa4504_NeikiAnalytics.exe
-
Size
903KB
-
MD5
d39d8d04be6d49a49e68c172cdcdd730
-
SHA1
06d93db8f5877ac3ceb1db784a328e37dd4e0c17
-
SHA256
1ac777a4f61e152cdc7ec28c18c91351b0d18caaddfac3d261aab788bafa4504
-
SHA512
21d8d4c4493d5acce32b2422f0ad710966379135a74d16a72b8804102d1f0f7848f6c1451bcf5208310db09e7806f70c254110b8e4217439810c11ad5ec9162f
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5/:gh+ZkldoPK8YaKG/
Score10/10-
Drops startup file
-
Suspicious use of SetThreadContext
-