General

  • Target

    15b5b37aa2880f173b8b6ec265ac4b50_NeikiAnalytics

  • Size

    178KB

  • Sample

    240509-2r4n1abc3w

  • MD5

    15b5b37aa2880f173b8b6ec265ac4b50

  • SHA1

    d22b6a1f1b7761c0c5510aae12d70bbc02e887dd

  • SHA256

    4e2edd898dcd61fa4415c724a98e29007846be8e57393c37bc7811d8c11b9d90

  • SHA512

    682650570fddec93d6a226ff775f5f026488b0127f7e2c2d452aa6ee6bc4ee1d8c8222d28fb975343eac154b0d8772e5d0293cd41f2e53895126b4d976fa9a84

  • SSDEEP

    3072:p3m3J+rwnJOc5/pPRdgTlr8MjaIU3+1jhlqQ3OJRUGCm2wLbxp7d+nr9MXoG+cRz:drwnLpPATlwMuIU3+1OQ3+ZawZL+Ruoa

Malware Config

Targets

    • Target

      15b5b37aa2880f173b8b6ec265ac4b50_NeikiAnalytics

    • Size

      178KB

    • MD5

      15b5b37aa2880f173b8b6ec265ac4b50

    • SHA1

      d22b6a1f1b7761c0c5510aae12d70bbc02e887dd

    • SHA256

      4e2edd898dcd61fa4415c724a98e29007846be8e57393c37bc7811d8c11b9d90

    • SHA512

      682650570fddec93d6a226ff775f5f026488b0127f7e2c2d452aa6ee6bc4ee1d8c8222d28fb975343eac154b0d8772e5d0293cd41f2e53895126b4d976fa9a84

    • SSDEEP

      3072:p3m3J+rwnJOc5/pPRdgTlr8MjaIU3+1jhlqQ3OJRUGCm2wLbxp7d+nr9MXoG+cRz:drwnLpPATlwMuIU3+1OQ3+ZawZL+Ruoa

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks