General
-
Target
3ff75f8076e534e38af7c3d142063c4a0a637444e1e4726404f700440790d4dd_NeikiAnalytics.exe
-
Size
904KB
-
Sample
240702-g4rvrazene
-
MD5
9628d42a0ab167a53a4cacc14d5a2590
-
SHA1
d763751f3d5c720d170624aacc6b981449095199
-
SHA256
3ff75f8076e534e38af7c3d142063c4a0a637444e1e4726404f700440790d4dd
-
SHA512
f1d3af96683ddf1dc7ceaac937f817d5307e1f6f9972c17842ab8e026102a742e1a6f589f66ff3842509777bfd0521f7d1ae3df8912ff1871fd12ff9755bee04
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5t:gh+ZkldoPK8YaKGt
Static task
static1
Behavioral task
behavioral1
Sample
3ff75f8076e534e38af7c3d142063c4a0a637444e1e4726404f700440790d4dd_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3ff75f8076e534e38af7c3d142063c4a0a637444e1e4726404f700440790d4dd_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
3ff75f8076e534e38af7c3d142063c4a0a637444e1e4726404f700440790d4dd_NeikiAnalytics.exe
-
Size
904KB
-
MD5
9628d42a0ab167a53a4cacc14d5a2590
-
SHA1
d763751f3d5c720d170624aacc6b981449095199
-
SHA256
3ff75f8076e534e38af7c3d142063c4a0a637444e1e4726404f700440790d4dd
-
SHA512
f1d3af96683ddf1dc7ceaac937f817d5307e1f6f9972c17842ab8e026102a742e1a6f589f66ff3842509777bfd0521f7d1ae3df8912ff1871fd12ff9755bee04
-
SSDEEP
24576:ZAHnh+eWsN3skA4RV1Hom2KXMmHaKZa5t:gh+ZkldoPK8YaKGt
Score10/10-
Drops startup file
-
Suspicious use of SetThreadContext
-