General

  • Target

    765a66b9965ede0eeb4874257e8586a0_NeikiAnalytics

  • Size

    1.6MB

  • Sample

    240510-fmhp3sfg49

  • MD5

    765a66b9965ede0eeb4874257e8586a0

  • SHA1

    15502170e1c239ab14ccdd135844cde0d9918e73

  • SHA256

    7df12f9084684eda3c95d1bf59411f5bb509cb40a5d88cbfeda4fecec0de3c51

  • SHA512

    eb0d55828d622e96b471f7e2b16671c7ebaf2d3367a94057ee77c690e4c2dd4d098423eb7d5462d34672a32dc6c1d77cd08bf3cc3cc96b8854a2cc885500ae03

  • SSDEEP

    49152:N5ExpAUlhHwQEyg8pdx509tFF/WPt0TSQiD1F2i7Kx:N5mHdJzx5wL8STSQiZgem

Malware Config

Targets

    • Target

      765a66b9965ede0eeb4874257e8586a0_NeikiAnalytics

    • Size

      1.6MB

    • MD5

      765a66b9965ede0eeb4874257e8586a0

    • SHA1

      15502170e1c239ab14ccdd135844cde0d9918e73

    • SHA256

      7df12f9084684eda3c95d1bf59411f5bb509cb40a5d88cbfeda4fecec0de3c51

    • SHA512

      eb0d55828d622e96b471f7e2b16671c7ebaf2d3367a94057ee77c690e4c2dd4d098423eb7d5462d34672a32dc6c1d77cd08bf3cc3cc96b8854a2cc885500ae03

    • SSDEEP

      49152:N5ExpAUlhHwQEyg8pdx509tFF/WPt0TSQiD1F2i7Kx:N5mHdJzx5wL8STSQiZgem

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks