General

  • Target

    0b9685b72db7a16761c1f36f501ad360_NEIKI

  • Size

    81KB

  • Sample

    240508-h93pwabg42

  • MD5

    0b9685b72db7a16761c1f36f501ad360

  • SHA1

    f003bf78998583c52da37f94c10a0c98c2c4de6f

  • SHA256

    5e8d4244ebb254d4f392975f4799153db026290d981544d2f504c372a20ba577

  • SHA512

    709926363e1d9b7a8281b0da347ccea820c489e64f3a9845078992f66263c101f130b3f4e0d0bd8a65b1a6d87f58998e3354d4472f0317993eaaf61c855b890d

  • SSDEEP

    1536:lCbhjW8rhK4rg6Z1qdkMB5eIO292XbNTx9sy8ifyXxyk3D3Wfn25B76Ps06DcBqk:QbhjWfe/+dkg4ZfWiKAC3W67E5nBqk

Malware Config

Targets

    • Target

      0b9685b72db7a16761c1f36f501ad360_NEIKI

    • Size

      81KB

    • MD5

      0b9685b72db7a16761c1f36f501ad360

    • SHA1

      f003bf78998583c52da37f94c10a0c98c2c4de6f

    • SHA256

      5e8d4244ebb254d4f392975f4799153db026290d981544d2f504c372a20ba577

    • SHA512

      709926363e1d9b7a8281b0da347ccea820c489e64f3a9845078992f66263c101f130b3f4e0d0bd8a65b1a6d87f58998e3354d4472f0317993eaaf61c855b890d

    • SSDEEP

      1536:lCbhjW8rhK4rg6Z1qdkMB5eIO292XbNTx9sy8ifyXxyk3D3Wfn25B76Ps06DcBqk:QbhjWfe/+dkg4ZfWiKAC3W67E5nBqk

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks