General

  • Target

    b78195e96796ba11e0b3b612ddfc9f70_NEIKI

  • Size

    363KB

  • Sample

    240508-p8b9vsdf9w

  • MD5

    b78195e96796ba11e0b3b612ddfc9f70

  • SHA1

    0362620ba06697cf094220572e832f49f1f860b1

  • SHA256

    a98917e2e29b5f24ecceac046f42bf5f649ca7329bc906a06ad15a71c9762282

  • SHA512

    a69f8f81260784cab1a9beda285ced2407ce3f6def688e612a7d43873bcdb1ffc4321b31b2a12c48688634c3fa2b163d11131e7b385f9e4bab7f1f86b3352753

  • SSDEEP

    6144:bPDLCL4Io5R4nM/4/lTPuM84NIHxoI6R0X6nzPJFPD7Cg+yDwZixuus6eQMBCgHX:bPKL8qZPucNIzinvCgVDwZix7Lh4H8dY

Malware Config

Targets

    • Target

      b78195e96796ba11e0b3b612ddfc9f70_NEIKI

    • Size

      363KB

    • MD5

      b78195e96796ba11e0b3b612ddfc9f70

    • SHA1

      0362620ba06697cf094220572e832f49f1f860b1

    • SHA256

      a98917e2e29b5f24ecceac046f42bf5f649ca7329bc906a06ad15a71c9762282

    • SHA512

      a69f8f81260784cab1a9beda285ced2407ce3f6def688e612a7d43873bcdb1ffc4321b31b2a12c48688634c3fa2b163d11131e7b385f9e4bab7f1f86b3352753

    • SSDEEP

      6144:bPDLCL4Io5R4nM/4/lTPuM84NIHxoI6R0X6nzPJFPD7Cg+yDwZixuus6eQMBCgHX:bPKL8qZPucNIzinvCgVDwZix7Lh4H8dY

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks