General

  • Target

    e8f1a87ceb18ac94ff0a101917991b50_NeikiAnalytics

  • Size

    87KB

  • Sample

    240509-yz8q5scd3x

  • MD5

    e8f1a87ceb18ac94ff0a101917991b50

  • SHA1

    16a1fd50752b3e9a26989ac010de4723145af6b8

  • SHA256

    05612e227a0ed0b173103adc07522503e20d67c8655975b6384d5ea93119d2f2

  • SHA512

    53ee6bbef2c201083789499be4ea12da8beb5f4b3668584393c6c815a4408d5d491b5507985b7dda358108fd445653679af6ecf6db79d61ed56e92f26d4e4ac5

  • SSDEEP

    1536:8gDktLw4rO10tMrlk3SJDlf98jqP+8il3CxOeZIckWlmyp:uLRrO10TiJD9yjqrilyxOuPp

Malware Config

Targets

    • Target

      e8f1a87ceb18ac94ff0a101917991b50_NeikiAnalytics

    • Size

      87KB

    • MD5

      e8f1a87ceb18ac94ff0a101917991b50

    • SHA1

      16a1fd50752b3e9a26989ac010de4723145af6b8

    • SHA256

      05612e227a0ed0b173103adc07522503e20d67c8655975b6384d5ea93119d2f2

    • SHA512

      53ee6bbef2c201083789499be4ea12da8beb5f4b3668584393c6c815a4408d5d491b5507985b7dda358108fd445653679af6ecf6db79d61ed56e92f26d4e4ac5

    • SSDEEP

      1536:8gDktLw4rO10tMrlk3SJDlf98jqP+8il3CxOeZIckWlmyp:uLRrO10TiJD9yjqrilyxOuPp

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks