General
-
Target
6d112cf976cdc9bfda5dc00735ac3428eb86f5a23dc13c9fae8b587bf1ca4a57_NeikiAnalytics.exe
-
Size
951KB
-
Sample
240623-ph4w7atdqk
-
MD5
44d32809d17a9cd97656bfd5f7d5bd30
-
SHA1
d69d36df07b9afd6964d549171fd78a93627221b
-
SHA256
6d112cf976cdc9bfda5dc00735ac3428eb86f5a23dc13c9fae8b587bf1ca4a57
-
SHA512
a573fdd2c7e0f38d9c9ce3f6aaf462eacf91ace87e02d8490e1517777c2cf4f9a2aa89f6871e36cf3377163108e8076bcf21ed601835c6c3aa8739fa797014f6
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5b:Rh+ZkldDPK8YaKjb
Static task
static1
Behavioral task
behavioral1
Sample
6d112cf976cdc9bfda5dc00735ac3428eb86f5a23dc13c9fae8b587bf1ca4a57_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6d112cf976cdc9bfda5dc00735ac3428eb86f5a23dc13c9fae8b587bf1ca4a57_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
6d112cf976cdc9bfda5dc00735ac3428eb86f5a23dc13c9fae8b587bf1ca4a57_NeikiAnalytics.exe
-
Size
951KB
-
MD5
44d32809d17a9cd97656bfd5f7d5bd30
-
SHA1
d69d36df07b9afd6964d549171fd78a93627221b
-
SHA256
6d112cf976cdc9bfda5dc00735ac3428eb86f5a23dc13c9fae8b587bf1ca4a57
-
SHA512
a573fdd2c7e0f38d9c9ce3f6aaf462eacf91ace87e02d8490e1517777c2cf4f9a2aa89f6871e36cf3377163108e8076bcf21ed601835c6c3aa8739fa797014f6
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5b:Rh+ZkldDPK8YaKjb
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-