General
-
Target
3a0ac9d64986445944e79b00685b1f46ef85d2857ba6fd6bbeaca4ce4292806b_NeikiAnalytics.exe
-
Size
951KB
-
Sample
240702-fzcplaxflg
-
MD5
23eb6b5a73fe19884c846558fb26ad90
-
SHA1
3ae7db1e18a7967e42eb4a41e7b712ab3c09b1d6
-
SHA256
3a0ac9d64986445944e79b00685b1f46ef85d2857ba6fd6bbeaca4ce4292806b
-
SHA512
06c29c44576f48d6d5bc76432161c4c9be0e6264023cf0db3d2f92abacaf5e4a8e1d0f98234158a179b9f0069f89221dc5375d349f9860ca25f8d0506c829d50
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT57:Rh+ZkldDPK8YaKj7
Static task
static1
Behavioral task
behavioral1
Sample
3a0ac9d64986445944e79b00685b1f46ef85d2857ba6fd6bbeaca4ce4292806b_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a0ac9d64986445944e79b00685b1f46ef85d2857ba6fd6bbeaca4ce4292806b_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
3a0ac9d64986445944e79b00685b1f46ef85d2857ba6fd6bbeaca4ce4292806b_NeikiAnalytics.exe
-
Size
951KB
-
MD5
23eb6b5a73fe19884c846558fb26ad90
-
SHA1
3ae7db1e18a7967e42eb4a41e7b712ab3c09b1d6
-
SHA256
3a0ac9d64986445944e79b00685b1f46ef85d2857ba6fd6bbeaca4ce4292806b
-
SHA512
06c29c44576f48d6d5bc76432161c4c9be0e6264023cf0db3d2f92abacaf5e4a8e1d0f98234158a179b9f0069f89221dc5375d349f9860ca25f8d0506c829d50
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT57:Rh+ZkldDPK8YaKj7
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-