General
-
Target
40043668b0ad9a66018432d3e9ffe7d0466a6348a8ee6250a606e841e114b270_NeikiAnalytics.exe
-
Size
669KB
-
Sample
240629-bard8sxala
-
MD5
20c87c0011a4c4e3f04ec184b2da37c0
-
SHA1
79961ba86f963f408e5bf955240a35626d720abc
-
SHA256
40043668b0ad9a66018432d3e9ffe7d0466a6348a8ee6250a606e841e114b270
-
SHA512
a1e35d485c78992b1edb558d38d1fa496f51b336974b2dc97c4cba1eb900f824969648e64ea59d7ce0f2f3a82641cb98dda4b29790277632198dff021ea9c199
-
SSDEEP
12288:OOKGNiyQiSeBZUorJXvDAa7r1QdsSHPrkorOr24M5wUi6hsmzfp0p3g0rY2O8h4w:OYQiREorhWskjVSr24MGp6Km7y
Static task
static1
Behavioral task
behavioral1
Sample
40043668b0ad9a66018432d3e9ffe7d0466a6348a8ee6250a606e841e114b270_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
40043668b0ad9a66018432d3e9ffe7d0466a6348a8ee6250a606e841e114b270_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.normagroup.com.tr - Port:
21 - Username:
[email protected] - Password:
Qb.X[.j.Yfm[
Targets
-
-
Target
40043668b0ad9a66018432d3e9ffe7d0466a6348a8ee6250a606e841e114b270_NeikiAnalytics.exe
-
Size
669KB
-
MD5
20c87c0011a4c4e3f04ec184b2da37c0
-
SHA1
79961ba86f963f408e5bf955240a35626d720abc
-
SHA256
40043668b0ad9a66018432d3e9ffe7d0466a6348a8ee6250a606e841e114b270
-
SHA512
a1e35d485c78992b1edb558d38d1fa496f51b336974b2dc97c4cba1eb900f824969648e64ea59d7ce0f2f3a82641cb98dda4b29790277632198dff021ea9c199
-
SSDEEP
12288:OOKGNiyQiSeBZUorJXvDAa7r1QdsSHPrkorOr24M5wUi6hsmzfp0p3g0rY2O8h4w:OYQiREorhWskjVSr24MGp6Km7y
Score10/10-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext
-