General

  • Target

    09684fe5263bb9c55d9e7bab5315fd40_NEIKI

  • Size

    224KB

  • Sample

    240509-ld38baag2x

  • MD5

    09684fe5263bb9c55d9e7bab5315fd40

  • SHA1

    5c630da4a6dcabaa587943ed478fb0a7a795d9fa

  • SHA256

    5f34e09f381d7e46a5f4a59712d860441a609cb2352351195d46bb5eb4305407

  • SHA512

    7607b7c6d24e1d7c61e9711b085580cddd1042882c7a355ba8c43b2feefc41d5a1b07c86aceb5095bd470d7ac861bc1307e579470a1e1389c023cb799012ef7b

  • SSDEEP

    6144:CIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZy:PKofHfHTXQLzgvnzHPowYbvrjD/L7QPo

Malware Config

Targets

    • Target

      09684fe5263bb9c55d9e7bab5315fd40_NEIKI

    • Size

      224KB

    • MD5

      09684fe5263bb9c55d9e7bab5315fd40

    • SHA1

      5c630da4a6dcabaa587943ed478fb0a7a795d9fa

    • SHA256

      5f34e09f381d7e46a5f4a59712d860441a609cb2352351195d46bb5eb4305407

    • SHA512

      7607b7c6d24e1d7c61e9711b085580cddd1042882c7a355ba8c43b2feefc41d5a1b07c86aceb5095bd470d7ac861bc1307e579470a1e1389c023cb799012ef7b

    • SSDEEP

      6144:CIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZy:PKofHfHTXQLzgvnzHPowYbvrjD/L7QPo

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks