General

  • Target

    049be811134e2218682329894a204c30_NEIKI

  • Size

    559KB

  • Sample

    240509-kbc3nsha6x

  • MD5

    049be811134e2218682329894a204c30

  • SHA1

    092eb50c15e12bb63ebd8b6f0395fdcf370882d6

  • SHA256

    834725aa6a297e3e49039928786e88f7ac3d4a2e09356e46b51ca8680cb37bf4

  • SHA512

    c350cc41381fca82fbe5ed3d48ddbf7645c383c5d565f546f4c71d7677357316f876443f1838491e986acf172420d5ae7b86aa130212836dc5a57d9ca8e99833

  • SSDEEP

    12288:0EQoSCP5wRxeg6IBuCdmeY7n1NhhTEStUIvgJtM6ZZ:0owRHxu2mR7LhhTXUPM2Z

Malware Config

Targets

    • Target

      049be811134e2218682329894a204c30_NEIKI

    • Size

      559KB

    • MD5

      049be811134e2218682329894a204c30

    • SHA1

      092eb50c15e12bb63ebd8b6f0395fdcf370882d6

    • SHA256

      834725aa6a297e3e49039928786e88f7ac3d4a2e09356e46b51ca8680cb37bf4

    • SHA512

      c350cc41381fca82fbe5ed3d48ddbf7645c383c5d565f546f4c71d7677357316f876443f1838491e986acf172420d5ae7b86aa130212836dc5a57d9ca8e99833

    • SSDEEP

      12288:0EQoSCP5wRxeg6IBuCdmeY7n1NhhTEStUIvgJtM6ZZ:0owRHxu2mR7LhhTXUPM2Z

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks