General
-
Target
508b4b4b57ae92c6312e0c7edd2bf6a1b95562da193d8762607521097df9cd02_NeikiAnalytics.exe
-
Size
78KB
-
Sample
240701-n6zrpstemp
-
MD5
01f4a1d4695f851b2d1d6d545cae22b0
-
SHA1
28becd4aaccec6c9649a7ad9e00e0bd0cd8968a9
-
SHA256
508b4b4b57ae92c6312e0c7edd2bf6a1b95562da193d8762607521097df9cd02
-
SHA512
ad8fb28a307c2e9a98b33ac24f287b2237c3751416415002b6c09fac5504ea1ab4e3597d986c16e2b527b7a5cfd921283584c6148e6947a9146efdd0a9fd237b
-
SSDEEP
1536:jSV5gdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQt9669/hl1+8:jSV5vn7N041QqhgN9/h7
Static task
static1
Behavioral task
behavioral1
Sample
508b4b4b57ae92c6312e0c7edd2bf6a1b95562da193d8762607521097df9cd02_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
508b4b4b57ae92c6312e0c7edd2bf6a1b95562da193d8762607521097df9cd02_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
508b4b4b57ae92c6312e0c7edd2bf6a1b95562da193d8762607521097df9cd02_NeikiAnalytics.exe
-
Size
78KB
-
MD5
01f4a1d4695f851b2d1d6d545cae22b0
-
SHA1
28becd4aaccec6c9649a7ad9e00e0bd0cd8968a9
-
SHA256
508b4b4b57ae92c6312e0c7edd2bf6a1b95562da193d8762607521097df9cd02
-
SHA512
ad8fb28a307c2e9a98b33ac24f287b2237c3751416415002b6c09fac5504ea1ab4e3597d986c16e2b527b7a5cfd921283584c6148e6947a9146efdd0a9fd237b
-
SSDEEP
1536:jSV5gdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQt9669/hl1+8:jSV5vn7N041QqhgN9/h7
Score10/10-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-