General

  • Target

    6fde33c5ef33a0a3eedea39c1a26c2d0_NeikiAnalytics

  • Size

    2.0MB

  • Sample

    240509-spkzfage2t

  • MD5

    6fde33c5ef33a0a3eedea39c1a26c2d0

  • SHA1

    6e12cfd8bb08ccf1f3e2ede32645f803f3ccf522

  • SHA256

    49040ef70df0fa235b5e5e1d17002f90e4f8e7a93e7cd6442e21c5361d4a7b9a

  • SHA512

    c39549e175b1f8acc891a3c8e8cb3573e72836ee6b2a0424aea64bd6811e34cd8a6c906456f3b1c1cc5e318860ca77ec8e962681e297687183113f4b3843ea42

  • SSDEEP

    49152:vLw6jXRZcbwfNFDwkLj26NLY5YYQBDUwJOJEeVohMPxJUrhGX:MqOYtNt78VKhMPANY

Malware Config

Targets

    • Target

      6fde33c5ef33a0a3eedea39c1a26c2d0_NeikiAnalytics

    • Size

      2.0MB

    • MD5

      6fde33c5ef33a0a3eedea39c1a26c2d0

    • SHA1

      6e12cfd8bb08ccf1f3e2ede32645f803f3ccf522

    • SHA256

      49040ef70df0fa235b5e5e1d17002f90e4f8e7a93e7cd6442e21c5361d4a7b9a

    • SHA512

      c39549e175b1f8acc891a3c8e8cb3573e72836ee6b2a0424aea64bd6811e34cd8a6c906456f3b1c1cc5e318860ca77ec8e962681e297687183113f4b3843ea42

    • SSDEEP

      49152:vLw6jXRZcbwfNFDwkLj26NLY5YYQBDUwJOJEeVohMPxJUrhGX:MqOYtNt78VKhMPANY

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks