General

  • Target

    e17d419d936469e8c59c48fb53ed9520_NEIKI

  • Size

    1.6MB

  • Sample

    240508-f2hcvscg4w

  • MD5

    e17d419d936469e8c59c48fb53ed9520

  • SHA1

    fbc64d991ffc059114f82d6bf07ec06ef9322995

  • SHA256

    8b6cfa0c681a8129520499dbcdf581fefbc0b0491311f210e372e9e0503ffddd

  • SHA512

    4642b80579ead5242b9ffe3bcda590eb370f3d072eb1cb3cdb457bba62f684b6da198ed62f91c9a9a658e13a6e7b0ea96674a891a70b8a32201613f159935de9

  • SSDEEP

    49152:ExYMx3jWURbCeeLntFHVkb4QMF9dy5OmbYr9:G1BRbC1ts6sY2q

Malware Config

Targets

    • Target

      e17d419d936469e8c59c48fb53ed9520_NEIKI

    • Size

      1.6MB

    • MD5

      e17d419d936469e8c59c48fb53ed9520

    • SHA1

      fbc64d991ffc059114f82d6bf07ec06ef9322995

    • SHA256

      8b6cfa0c681a8129520499dbcdf581fefbc0b0491311f210e372e9e0503ffddd

    • SHA512

      4642b80579ead5242b9ffe3bcda590eb370f3d072eb1cb3cdb457bba62f684b6da198ed62f91c9a9a658e13a6e7b0ea96674a891a70b8a32201613f159935de9

    • SSDEEP

      49152:ExYMx3jWURbCeeLntFHVkb4QMF9dy5OmbYr9:G1BRbC1ts6sY2q

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks