General

  • Target

    3984aa3180c13d403e1da77191b94d10_NEIKI

  • Size

    1.1MB

  • Sample

    240508-kygz5sfb82

  • MD5

    3984aa3180c13d403e1da77191b94d10

  • SHA1

    044674e40b8c06ca0c27dbba49589935fd438a9b

  • SHA256

    d21f40e7da3863ebdaa474f3194c276e16d92ac56e1fc1a6e7e68552b1161c05

  • SHA512

    348b3cfd627cf03f329c845fef9f25493be645c87f74ef0ae07b64bd5adbf0c011c79b389f68fdf230c6e878edad987d648603ea45676644c64b42278eff6178

  • SSDEEP

    24576:t2fxt9v6gKJF4MEhSDhUGm3yyxfJSswrEqwJ3UfOej1NWntr0Mo:QZt3MEhQhXmpxhSswrH3OepNWndno

Malware Config

Targets

    • Target

      3984aa3180c13d403e1da77191b94d10_NEIKI

    • Size

      1.1MB

    • MD5

      3984aa3180c13d403e1da77191b94d10

    • SHA1

      044674e40b8c06ca0c27dbba49589935fd438a9b

    • SHA256

      d21f40e7da3863ebdaa474f3194c276e16d92ac56e1fc1a6e7e68552b1161c05

    • SHA512

      348b3cfd627cf03f329c845fef9f25493be645c87f74ef0ae07b64bd5adbf0c011c79b389f68fdf230c6e878edad987d648603ea45676644c64b42278eff6178

    • SSDEEP

      24576:t2fxt9v6gKJF4MEhSDhUGm3yyxfJSswrEqwJ3UfOej1NWntr0Mo:QZt3MEhQhXmpxhSswrH3OepNWndno

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks