General
-
Target
84ef6f643f5f05c2545f4490f973e3903e888d057e95f94b3d394dcf2b53a4f0_NeikiAnalytics.exe
-
Size
903KB
-
Sample
240627-pnybla1fmf
-
MD5
31403aeedfa71ddf1ba3754acf6be440
-
SHA1
825caaacd8b43bac7c54389ecdc27aa62bf8ed72
-
SHA256
84ef6f643f5f05c2545f4490f973e3903e888d057e95f94b3d394dcf2b53a4f0
-
SHA512
2d532d8c82de0040648f37699c321f6c3e83f62a9a3941e1d55f79eef88fd09690e3b8671586d45483ad52db1b2ddf872c95ccf15409ba89ac066cd2b6c4e55b
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5m:gh+ZkldoPK8YaKGm
Static task
static1
Behavioral task
behavioral1
Sample
84ef6f643f5f05c2545f4490f973e3903e888d057e95f94b3d394dcf2b53a4f0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
84ef6f643f5f05c2545f4490f973e3903e888d057e95f94b3d394dcf2b53a4f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
84ef6f643f5f05c2545f4490f973e3903e888d057e95f94b3d394dcf2b53a4f0_NeikiAnalytics.exe
-
Size
903KB
-
MD5
31403aeedfa71ddf1ba3754acf6be440
-
SHA1
825caaacd8b43bac7c54389ecdc27aa62bf8ed72
-
SHA256
84ef6f643f5f05c2545f4490f973e3903e888d057e95f94b3d394dcf2b53a4f0
-
SHA512
2d532d8c82de0040648f37699c321f6c3e83f62a9a3941e1d55f79eef88fd09690e3b8671586d45483ad52db1b2ddf872c95ccf15409ba89ac066cd2b6c4e55b
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5m:gh+ZkldoPK8YaKGm
Score10/10-
Drops startup file
-
Suspicious use of SetThreadContext
-