General

  • Target

    cb23b945e5a6e1d94b6ada65b5dd3c80_NEIKI

  • Size

    147KB

  • Sample

    240508-evpypacg75

  • MD5

    cb23b945e5a6e1d94b6ada65b5dd3c80

  • SHA1

    e1f277ab6dc23a63836467c9183b2bb93ffbd020

  • SHA256

    45585ed83a9cb3fd3c76d75de1b58925e02314951c26d6fd3ae80e13002dd813

  • SHA512

    74605501cdb9fff729fde83de57a98200a06c7bae5525a4f24254e6e61faf6a498752e0bd5fb78bb1aa6cc857a2ff06c1b03b9fe45d694a75b8c13024024cd0d

  • SSDEEP

    3072:1OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPP1:1Is9OKofHfHTXQLzgvnzHPowYbvrjD/C

Malware Config

Targets

    • Target

      cb23b945e5a6e1d94b6ada65b5dd3c80_NEIKI

    • Size

      147KB

    • MD5

      cb23b945e5a6e1d94b6ada65b5dd3c80

    • SHA1

      e1f277ab6dc23a63836467c9183b2bb93ffbd020

    • SHA256

      45585ed83a9cb3fd3c76d75de1b58925e02314951c26d6fd3ae80e13002dd813

    • SHA512

      74605501cdb9fff729fde83de57a98200a06c7bae5525a4f24254e6e61faf6a498752e0bd5fb78bb1aa6cc857a2ff06c1b03b9fe45d694a75b8c13024024cd0d

    • SSDEEP

      3072:1OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPP1:1Is9OKofHfHTXQLzgvnzHPowYbvrjD/C

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks