General
-
Target
2ebc3ad7e3f378738e2a0f9c533f19731bb486600d6f22e741f83d2c5eb505c8_NeikiAnalytics.exe
-
Size
951KB
-
Sample
240702-d1zjmsxenj
-
MD5
368f78e8dfa987896ecc82d8d2c324b0
-
SHA1
bb3208298cb16d83c343509a48fce63345867c0a
-
SHA256
2ebc3ad7e3f378738e2a0f9c533f19731bb486600d6f22e741f83d2c5eb505c8
-
SHA512
92d72b52b8c749907b98af5f539c957210e481e317782b79a7881f6634514a020e4773ae36796dcea05965b85b0f6276a9a433ea9f5b55ac5d1af0a0dfa67f77
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5q:Rh+ZkldDPK8YaKjq
Static task
static1
Behavioral task
behavioral1
Sample
2ebc3ad7e3f378738e2a0f9c533f19731bb486600d6f22e741f83d2c5eb505c8_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2ebc3ad7e3f378738e2a0f9c533f19731bb486600d6f22e741f83d2c5eb505c8_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
2ebc3ad7e3f378738e2a0f9c533f19731bb486600d6f22e741f83d2c5eb505c8_NeikiAnalytics.exe
-
Size
951KB
-
MD5
368f78e8dfa987896ecc82d8d2c324b0
-
SHA1
bb3208298cb16d83c343509a48fce63345867c0a
-
SHA256
2ebc3ad7e3f378738e2a0f9c533f19731bb486600d6f22e741f83d2c5eb505c8
-
SHA512
92d72b52b8c749907b98af5f539c957210e481e317782b79a7881f6634514a020e4773ae36796dcea05965b85b0f6276a9a433ea9f5b55ac5d1af0a0dfa67f77
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5q:Rh+ZkldDPK8YaKjq
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-