General
-
Target
39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf_NeikiAnalytics.exe
-
Size
858KB
-
Sample
240701-ggftzaxfkh
-
MD5
9385b14139f56fa7db4f0e6baa9204d0
-
SHA1
4b18c25a5da353acd74024202cbe16c4abb8e461
-
SHA256
39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf
-
SHA512
48482ad519c9f2f9b872e02e7c99c28f9247cd1244c8a0b47873c69e2ea6029df0bbf7e285bce8c1c9c8b95b3d1486ff710e805b999623bd8770c542f4225380
-
SSDEEP
24576:/EN973phvt8tmUdkw1xG8fFjGMaOnO+pwFL9N09PP9:/EN973PvEL2wHBODLcPV
Behavioral task
behavioral1
Sample
39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf_NeikiAnalytics.exe
Resource
win7-20240611-en
Malware Config
Targets
-
-
Target
39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf_NeikiAnalytics.exe
-
Size
858KB
-
MD5
9385b14139f56fa7db4f0e6baa9204d0
-
SHA1
4b18c25a5da353acd74024202cbe16c4abb8e461
-
SHA256
39c620b49cb160c6953caf768d321f9c7689c6b85e6e318ed0988a2cfb7ce3bf
-
SHA512
48482ad519c9f2f9b872e02e7c99c28f9247cd1244c8a0b47873c69e2ea6029df0bbf7e285bce8c1c9c8b95b3d1486ff710e805b999623bd8770c542f4225380
-
SSDEEP
24576:/EN973phvt8tmUdkw1xG8fFjGMaOnO+pwFL9N09PP9:/EN973PvEL2wHBODLcPV
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-