General
-
Target
929e246b1ab3bada9748f6362aa1077c820139406cfa792d2651a2718a0646db_NeikiAnalytics.exe
-
Size
903KB
-
Sample
240628-l66h5stemc
-
MD5
3a9a1cd4a72321bb3bf06f43ce4769a0
-
SHA1
2fb6f2c388b1bbbc94d988a566b3cec3d50aa14a
-
SHA256
929e246b1ab3bada9748f6362aa1077c820139406cfa792d2651a2718a0646db
-
SHA512
b56fb53886e85c8842a929d11a06b1004f4f3e6582ae4248bff479064ddd2de0bbd4ba973f8d614d8d5d27450c743dabaf8d46ecb58857a50e5cba344b3cf93d
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5f:gh+ZkldoPK8YaKGf
Static task
static1
Behavioral task
behavioral1
Sample
929e246b1ab3bada9748f6362aa1077c820139406cfa792d2651a2718a0646db_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
929e246b1ab3bada9748f6362aa1077c820139406cfa792d2651a2718a0646db_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
929e246b1ab3bada9748f6362aa1077c820139406cfa792d2651a2718a0646db_NeikiAnalytics.exe
-
Size
903KB
-
MD5
3a9a1cd4a72321bb3bf06f43ce4769a0
-
SHA1
2fb6f2c388b1bbbc94d988a566b3cec3d50aa14a
-
SHA256
929e246b1ab3bada9748f6362aa1077c820139406cfa792d2651a2718a0646db
-
SHA512
b56fb53886e85c8842a929d11a06b1004f4f3e6582ae4248bff479064ddd2de0bbd4ba973f8d614d8d5d27450c743dabaf8d46ecb58857a50e5cba344b3cf93d
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5f:gh+ZkldoPK8YaKGf
Score10/10-
Drops startup file
-
Suspicious use of SetThreadContext
-