General
-
Target
27584ea3c26dda0d80ecaea51f379c1a85c049592012cd88e942a04395b378a6_NeikiAnalytics.exe
-
Size
951KB
-
Sample
240702-cmzf2ssejd
-
MD5
5e441153cf520b5d587f32b52eceb5c0
-
SHA1
c36cfeae93ff04a63306c1faf42b04ede791d980
-
SHA256
27584ea3c26dda0d80ecaea51f379c1a85c049592012cd88e942a04395b378a6
-
SHA512
3c10523f3fa56df6f3e4672902763a7409e1e47502db155a35fbf62c747598108a6901b78c2c965e710ad0b08356d2da223a2aac2414b976ff8c672a84f3211b
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5B:Rh+ZkldDPK8YaKjB
Static task
static1
Behavioral task
behavioral1
Sample
27584ea3c26dda0d80ecaea51f379c1a85c049592012cd88e942a04395b378a6_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
27584ea3c26dda0d80ecaea51f379c1a85c049592012cd88e942a04395b378a6_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
revengerat
Marzo26
marzorevenger.duckdns.org:4230
RV_MUTEX-PiGGjjtnxDpn
Targets
-
-
Target
27584ea3c26dda0d80ecaea51f379c1a85c049592012cd88e942a04395b378a6_NeikiAnalytics.exe
-
Size
951KB
-
MD5
5e441153cf520b5d587f32b52eceb5c0
-
SHA1
c36cfeae93ff04a63306c1faf42b04ede791d980
-
SHA256
27584ea3c26dda0d80ecaea51f379c1a85c049592012cd88e942a04395b378a6
-
SHA512
3c10523f3fa56df6f3e4672902763a7409e1e47502db155a35fbf62c747598108a6901b78c2c965e710ad0b08356d2da223a2aac2414b976ff8c672a84f3211b
-
SSDEEP
24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5B:Rh+ZkldDPK8YaKjB
Score10/10-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-