General

  • Target

    4b3d9a8630652665d5afde0495035b80_NEIKI

  • Size

    808KB

  • Sample

    240508-llx19sgf34

  • MD5

    4b3d9a8630652665d5afde0495035b80

  • SHA1

    afb6fd6369f80b4b0ea8a26ea0cac29d4811d34d

  • SHA256

    2b40c850bb225f6442ebae077ff479104f4fb9bd72e3db3fbbe73ba188f3f253

  • SHA512

    8d1ba58f13ecb471c459dc9482e7809770a6523f6d93de97e0cb131a01d1de0f9d6c2ad8bd56f9201f8883c7abe7baf05c17027d52358ac47cfb90320266061d

  • SSDEEP

    12288:CEQoSsyqQV9//JV0Ns17uYEPC/gknow8FX9O9F5rHb35+FpmFccWTYY:CV//J6CFuYEK/Tow859cJb3QnccP

Malware Config

Targets

    • Target

      4b3d9a8630652665d5afde0495035b80_NEIKI

    • Size

      808KB

    • MD5

      4b3d9a8630652665d5afde0495035b80

    • SHA1

      afb6fd6369f80b4b0ea8a26ea0cac29d4811d34d

    • SHA256

      2b40c850bb225f6442ebae077ff479104f4fb9bd72e3db3fbbe73ba188f3f253

    • SHA512

      8d1ba58f13ecb471c459dc9482e7809770a6523f6d93de97e0cb131a01d1de0f9d6c2ad8bd56f9201f8883c7abe7baf05c17027d52358ac47cfb90320266061d

    • SSDEEP

      12288:CEQoSsyqQV9//JV0Ns17uYEPC/gknow8FX9O9F5rHb35+FpmFccWTYY:CV//J6CFuYEK/Tow859cJb3QnccP

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks