General

  • Target

    b6a1c193757b65d80f2b240f47b1f240_NEIKI

  • Size

    1.7MB

  • Sample

    240508-p7j83sga99

  • MD5

    b6a1c193757b65d80f2b240f47b1f240

  • SHA1

    042d6f26c67bfe80a7551ecb3d8fd5dceb85b735

  • SHA256

    09d4a121a7f15159552e7dc1fada17705a233b2cef3e662058cfa38f32299fc8

  • SHA512

    2a69145ee73b64abdbf90a13525a630eeb0586665db33352b5f30758425d11ee71ddbd76fb41b8ec2d9f2b263da62eebd009990590625fae6b99edf2a98e90ea

  • SSDEEP

    49152:lEmgH9E8oEKTCQQErjSvuDfoqnnkXcX+3:HgHS96Erj1foqnTX+3

Malware Config

Targets

    • Target

      b6a1c193757b65d80f2b240f47b1f240_NEIKI

    • Size

      1.7MB

    • MD5

      b6a1c193757b65d80f2b240f47b1f240

    • SHA1

      042d6f26c67bfe80a7551ecb3d8fd5dceb85b735

    • SHA256

      09d4a121a7f15159552e7dc1fada17705a233b2cef3e662058cfa38f32299fc8

    • SHA512

      2a69145ee73b64abdbf90a13525a630eeb0586665db33352b5f30758425d11ee71ddbd76fb41b8ec2d9f2b263da62eebd009990590625fae6b99edf2a98e90ea

    • SSDEEP

      49152:lEmgH9E8oEKTCQQErjSvuDfoqnnkXcX+3:HgHS96Erj1foqnTX+3

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks