General

  • Target

    d1094cc41c407b1f1ef6c07454378a30_NeikiAnalytics

  • Size

    837KB

  • Sample

    240509-xwczmadd78

  • MD5

    d1094cc41c407b1f1ef6c07454378a30

  • SHA1

    da7d88ca29bd6b7925fb45eb621d1f989a41bba9

  • SHA256

    a5ed1bdd22f3d07994a77237c21bce6e074a087b0d2a6c11f6bdbcd86e3c04e6

  • SHA512

    436f9e36c259f948616cf4010b19b6e523e1eef054c0267e043524d0a2b03e41ac9d2e52b615c4f45aba1d9c159690d5e5182cfb66fc1d65c115e8fec5eee3d3

  • SSDEEP

    24576:gtfGL7aNRx2qC8RYweHNfvMv/zzajM3EBTIrwz:cGL76YuSZNfknzzaYJEz

Malware Config

Targets

    • Target

      d1094cc41c407b1f1ef6c07454378a30_NeikiAnalytics

    • Size

      837KB

    • MD5

      d1094cc41c407b1f1ef6c07454378a30

    • SHA1

      da7d88ca29bd6b7925fb45eb621d1f989a41bba9

    • SHA256

      a5ed1bdd22f3d07994a77237c21bce6e074a087b0d2a6c11f6bdbcd86e3c04e6

    • SHA512

      436f9e36c259f948616cf4010b19b6e523e1eef054c0267e043524d0a2b03e41ac9d2e52b615c4f45aba1d9c159690d5e5182cfb66fc1d65c115e8fec5eee3d3

    • SSDEEP

      24576:gtfGL7aNRx2qC8RYweHNfvMv/zzajM3EBTIrwz:cGL76YuSZNfknzzaYJEz

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks