General

  • Target

    9ed2b92d1511bb8689454a115e0434f0_NeikiAnalytics

  • Size

    116KB

  • Sample

    240510-h535vadd22

  • MD5

    9ed2b92d1511bb8689454a115e0434f0

  • SHA1

    2a7c40a0da2d9ca7377ab041f0602c1890ed969e

  • SHA256

    1596b376edd5848fce3fc6e8aa8c195982308163aff9b57c054c0ba399881212

  • SHA512

    c84b17fd73910224fe9f71bf4a47d2d3c29b77bb4dfcb60b293cebe022eaff58745d0deea94c1f34a820bf94bbb23f54f487217abf4a4eb3a6eb1e3e522da6d0

  • SSDEEP

    3072:l7cCmsoFNphHj2IxjopLot15x+yfjqe/o:lolnp/epLo5xhT

Malware Config

Targets

    • Target

      9ed2b92d1511bb8689454a115e0434f0_NeikiAnalytics

    • Size

      116KB

    • MD5

      9ed2b92d1511bb8689454a115e0434f0

    • SHA1

      2a7c40a0da2d9ca7377ab041f0602c1890ed969e

    • SHA256

      1596b376edd5848fce3fc6e8aa8c195982308163aff9b57c054c0ba399881212

    • SHA512

      c84b17fd73910224fe9f71bf4a47d2d3c29b77bb4dfcb60b293cebe022eaff58745d0deea94c1f34a820bf94bbb23f54f487217abf4a4eb3a6eb1e3e522da6d0

    • SSDEEP

      3072:l7cCmsoFNphHj2IxjopLot15x+yfjqe/o:lolnp/epLo5xhT

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (81) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks