General
-
Target
17d8c90e52a2ce84a4d178778e3548c1b0b3ed751b0e755d13b31c72524002a0_NeikiAnalytics.exe
-
Size
904KB
-
Sample
240701-3jjjjaxale
-
MD5
9c308ff55c3bf409e55b91408ac17590
-
SHA1
9ce2f3f6fea731af3d8938daea051d62142ad755
-
SHA256
17d8c90e52a2ce84a4d178778e3548c1b0b3ed751b0e755d13b31c72524002a0
-
SHA512
88091949de9d92f1d2ffea5f2bbac8d0c13c42e3af814da2f02d56e88d8daefb57c8def3681eedaa37daee2d73c27fbe08ccb20c5b55d0137b2fa5e6c6c37e9c
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5o:gh+ZkldoPK8YaKGo
Static task
static1
Behavioral task
behavioral1
Sample
17d8c90e52a2ce84a4d178778e3548c1b0b3ed751b0e755d13b31c72524002a0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
17d8c90e52a2ce84a4d178778e3548c1b0b3ed751b0e755d13b31c72524002a0_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
17d8c90e52a2ce84a4d178778e3548c1b0b3ed751b0e755d13b31c72524002a0_NeikiAnalytics.exe
-
Size
904KB
-
MD5
9c308ff55c3bf409e55b91408ac17590
-
SHA1
9ce2f3f6fea731af3d8938daea051d62142ad755
-
SHA256
17d8c90e52a2ce84a4d178778e3548c1b0b3ed751b0e755d13b31c72524002a0
-
SHA512
88091949de9d92f1d2ffea5f2bbac8d0c13c42e3af814da2f02d56e88d8daefb57c8def3681eedaa37daee2d73c27fbe08ccb20c5b55d0137b2fa5e6c6c37e9c
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5o:gh+ZkldoPK8YaKGo
Score10/10-
Drops startup file
-
Suspicious use of SetThreadContext
-