General

  • Target

    36c5c6069ca3822592e7683f563aa580_NeikiAnalytics

  • Size

    804KB

  • Sample

    240510-bffvpada22

  • MD5

    36c5c6069ca3822592e7683f563aa580

  • SHA1

    4c7c1a29df42253ead8566090165c257217d4aa7

  • SHA256

    2f6bc51e30d71f12b50f53de271507a125feb0c924b4fed1b76f2458ce7646d6

  • SHA512

    d855de027f07b8fbd99d0ac617e4d9ac692aa4e506b0c1abbf3491ed699e3553a25ddb37a72e5da57841bc8ef5d28a492e5ac186850bcb667086b7d27963ec97

  • SSDEEP

    12288:bEQoSx0q9BWJTJ6JHLL51B+LcrQXgGQfC4FYVaPbRzFe22l6k+97DX0pbaIljEsQ:bHGs/1oGGyFYqVzQl6z43yJ

Malware Config

Targets

    • Target

      36c5c6069ca3822592e7683f563aa580_NeikiAnalytics

    • Size

      804KB

    • MD5

      36c5c6069ca3822592e7683f563aa580

    • SHA1

      4c7c1a29df42253ead8566090165c257217d4aa7

    • SHA256

      2f6bc51e30d71f12b50f53de271507a125feb0c924b4fed1b76f2458ce7646d6

    • SHA512

      d855de027f07b8fbd99d0ac617e4d9ac692aa4e506b0c1abbf3491ed699e3553a25ddb37a72e5da57841bc8ef5d28a492e5ac186850bcb667086b7d27963ec97

    • SSDEEP

      12288:bEQoSx0q9BWJTJ6JHLL51B+LcrQXgGQfC4FYVaPbRzFe22l6k+97DX0pbaIljEsQ:bHGs/1oGGyFYqVzQl6z43yJ

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks