General

  • Target

    871615b2f711e89f71c45deca5235130_NeikiAnalytics

  • Size

    1.0MB

  • Sample

    240510-gp7bwsac54

  • MD5

    871615b2f711e89f71c45deca5235130

  • SHA1

    322655185f08853758270b505d9581e6801aab33

  • SHA256

    c6aa067a516b1f72e81d2b2accdd8797b67e2e46461197998cbb8080ade0022d

  • SHA512

    2f448bb72322042aed09b2ad5983678fcf1cd8853f1973e99cf01e0290ccbb4208d2fbd68bca46c46dd7f87812a305e8855b488154dabff385b3374afff23746

  • SSDEEP

    24576:VrLC5nWpzFnpesuqU8cPjNYpgMPl9Vf4DyMe/vQylf:RCRezFnpeBFYd99VAGMe/v1f

Malware Config

Targets

    • Target

      871615b2f711e89f71c45deca5235130_NeikiAnalytics

    • Size

      1.0MB

    • MD5

      871615b2f711e89f71c45deca5235130

    • SHA1

      322655185f08853758270b505d9581e6801aab33

    • SHA256

      c6aa067a516b1f72e81d2b2accdd8797b67e2e46461197998cbb8080ade0022d

    • SHA512

      2f448bb72322042aed09b2ad5983678fcf1cd8853f1973e99cf01e0290ccbb4208d2fbd68bca46c46dd7f87812a305e8855b488154dabff385b3374afff23746

    • SSDEEP

      24576:VrLC5nWpzFnpesuqU8cPjNYpgMPl9Vf4DyMe/vQylf:RCRezFnpeBFYd99VAGMe/v1f

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks