General
-
Target
7ab2008f22c89dfea9dc27886d7046eb8e23d736b5b6aa707497f28073b0e21c_NeikiAnalytics.exe
-
Size
951KB
-
Sample
240627-l7w14aycjq
-
MD5
29c5ff18782054b3a7854aab92770820
-
SHA1
4155ab6132a08c9490b9f83c1fc599dad72bc661
-
SHA256
7ab2008f22c89dfea9dc27886d7046eb8e23d736b5b6aa707497f28073b0e21c
-
SHA512
bf4deacdef56cfd404524930459bfa680c4f74b7be2615e78b067581174cf173dd2b5858bcec3a2c8fc6106f8446f2d568eac7d4725ee88c5c1ebd59dad5111c
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5D:Rh+ZkldDPK8YaKjD
Static task
static1
Behavioral task
behavioral1
Sample
7ab2008f22c89dfea9dc27886d7046eb8e23d736b5b6aa707497f28073b0e21c_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
7ab2008f22c89dfea9dc27886d7046eb8e23d736b5b6aa707497f28073b0e21c_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
7ab2008f22c89dfea9dc27886d7046eb8e23d736b5b6aa707497f28073b0e21c_NeikiAnalytics.exe
-
Size
951KB
-
MD5
29c5ff18782054b3a7854aab92770820
-
SHA1
4155ab6132a08c9490b9f83c1fc599dad72bc661
-
SHA256
7ab2008f22c89dfea9dc27886d7046eb8e23d736b5b6aa707497f28073b0e21c
-
SHA512
bf4deacdef56cfd404524930459bfa680c4f74b7be2615e78b067581174cf173dd2b5858bcec3a2c8fc6106f8446f2d568eac7d4725ee88c5c1ebd59dad5111c
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5D:Rh+ZkldDPK8YaKjD
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-