General

  • Target

    22e590fab781b98d746a6cab167fb5c0_NeikiAnalytics

  • Size

    318KB

  • Sample

    240509-3rqmtaea4t

  • MD5

    22e590fab781b98d746a6cab167fb5c0

  • SHA1

    ea6e2b036131740b0d4753289354bcfe0c0a0931

  • SHA256

    95c68f8dff1f29221c1f6b29d446fa6243f7bf1eb046d64143487d18510895da

  • SHA512

    008575261202b2d9f32df027b87afdc1d62231e5ca702cea8252676cd41f39e58a41ad3e8c765c2e047b2cc7be3931fa7d3a2ade2abbcdd627f013988e9ee4ba

  • SSDEEP

    6144:bjluQoSsqaxIo5R4nM/u9YUqeCXg/4m8yHXCaMj85oIpaeXIvmg2Rph:bEQoSx0q79YGOH9PaMveaVERv

Malware Config

Targets

    • Target

      22e590fab781b98d746a6cab167fb5c0_NeikiAnalytics

    • Size

      318KB

    • MD5

      22e590fab781b98d746a6cab167fb5c0

    • SHA1

      ea6e2b036131740b0d4753289354bcfe0c0a0931

    • SHA256

      95c68f8dff1f29221c1f6b29d446fa6243f7bf1eb046d64143487d18510895da

    • SHA512

      008575261202b2d9f32df027b87afdc1d62231e5ca702cea8252676cd41f39e58a41ad3e8c765c2e047b2cc7be3931fa7d3a2ade2abbcdd627f013988e9ee4ba

    • SSDEEP

      6144:bjluQoSsqaxIo5R4nM/u9YUqeCXg/4m8yHXCaMj85oIpaeXIvmg2Rph:bEQoSx0q79YGOH9PaMveaVERv

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks