General

  • Target

    5091dd55609d37d1d0148d5623e972e0_NeikiAnalytics

  • Size

    549KB

  • Sample

    240510-c6cfmaec2v

  • MD5

    5091dd55609d37d1d0148d5623e972e0

  • SHA1

    bd407cee0b1764c95ba4e6396945767dcaf1b7ea

  • SHA256

    9b1e791e9356403a6e47d0ab38222e49e09c74adb197a239f43e97d94e301b5a

  • SHA512

    df932b0c0e6b52b2f90043d0288199aac2e362a8722c76ea6cadb2391aa39c02d116eeb20bd6cd47abd74444a1fe75293ba695e2a4d7fe70b6043732e79e6071

  • SSDEEP

    12288:VEQoSfqfUaolqmXThpOkNjP7eWN8QpIIutStyDFybsWLhgh1fJ0IZ:Vk2T2IP7vGQpIlStyWsWqT

Malware Config

Targets

    • Target

      5091dd55609d37d1d0148d5623e972e0_NeikiAnalytics

    • Size

      549KB

    • MD5

      5091dd55609d37d1d0148d5623e972e0

    • SHA1

      bd407cee0b1764c95ba4e6396945767dcaf1b7ea

    • SHA256

      9b1e791e9356403a6e47d0ab38222e49e09c74adb197a239f43e97d94e301b5a

    • SHA512

      df932b0c0e6b52b2f90043d0288199aac2e362a8722c76ea6cadb2391aa39c02d116eeb20bd6cd47abd74444a1fe75293ba695e2a4d7fe70b6043732e79e6071

    • SSDEEP

      12288:VEQoSfqfUaolqmXThpOkNjP7eWN8QpIIutStyDFybsWLhgh1fJ0IZ:Vk2T2IP7vGQpIlStyWsWqT

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks