General

  • Target

    b540686d5ff7d8be65d5def0a9fc40b0_NeikiAnalytics

  • Size

    963KB

  • Sample

    240509-wljtrafa6t

  • MD5

    b540686d5ff7d8be65d5def0a9fc40b0

  • SHA1

    6047dd9567ce6276e1a0015a25e13e34d0efffa5

  • SHA256

    d206dfc6b40c1836660e99c0ff52c716b5d1495ff2be6450e95a328f63e9dd9a

  • SHA512

    9c7bd4d4f8c5f7d7037e6d24eaf7761259ad4783bcec3128cabf8026939e12163a0a89ffa0f51a632c2771de1ebc8764c5a25d90496accd1d8685e19a2262aac

  • SSDEEP

    24576:oWeSl3yAS0yYSRANG8irUslilCJDVL116iMcq9:VRliAS3mNGdIDUJDVLe59

Malware Config

Targets

    • Target

      b540686d5ff7d8be65d5def0a9fc40b0_NeikiAnalytics

    • Size

      963KB

    • MD5

      b540686d5ff7d8be65d5def0a9fc40b0

    • SHA1

      6047dd9567ce6276e1a0015a25e13e34d0efffa5

    • SHA256

      d206dfc6b40c1836660e99c0ff52c716b5d1495ff2be6450e95a328f63e9dd9a

    • SHA512

      9c7bd4d4f8c5f7d7037e6d24eaf7761259ad4783bcec3128cabf8026939e12163a0a89ffa0f51a632c2771de1ebc8764c5a25d90496accd1d8685e19a2262aac

    • SSDEEP

      24576:oWeSl3yAS0yYSRANG8irUslilCJDVL116iMcq9:VRliAS3mNGdIDUJDVLe59

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks