General

  • Target

    cfafb7b8f5e147c7a6411d1c04851e10_NEIKI

  • Size

    1.5MB

  • Sample

    240508-q9qz3sfh7w

  • MD5

    cfafb7b8f5e147c7a6411d1c04851e10

  • SHA1

    a1d3d8c15b29f793dc6b2732123295a844af0642

  • SHA256

    8e83ceee2063ea4ff24ee8e4c3bd5b7dd4ad33e5f1f6bd903b5bd4e8c64d4e90

  • SHA512

    7637193925446bdaa66616fb650a412d960cd9888125e180f8f1feb465aba1d3d47bb139d76dcd8b44a9534ce14b668a9403fc8035322e88ace1602b2ea6b2e5

  • SSDEEP

    49152:Qh+iaa8AVemkFPjBREh2WS3cNgo98zxBQsAV:Q4i38JFPjBRw2WS3cf9yxBQfV

Malware Config

Targets

    • Target

      cfafb7b8f5e147c7a6411d1c04851e10_NEIKI

    • Size

      1.5MB

    • MD5

      cfafb7b8f5e147c7a6411d1c04851e10

    • SHA1

      a1d3d8c15b29f793dc6b2732123295a844af0642

    • SHA256

      8e83ceee2063ea4ff24ee8e4c3bd5b7dd4ad33e5f1f6bd903b5bd4e8c64d4e90

    • SHA512

      7637193925446bdaa66616fb650a412d960cd9888125e180f8f1feb465aba1d3d47bb139d76dcd8b44a9534ce14b668a9403fc8035322e88ace1602b2ea6b2e5

    • SSDEEP

      49152:Qh+iaa8AVemkFPjBREh2WS3cNgo98zxBQsAV:Q4i38JFPjBRw2WS3cf9yxBQfV

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks