General

  • Target

    9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics

  • Size

    155KB

  • Sample

    240510-ha2crsga6t

  • MD5

    9100525baa0f4926aec1e7f28ea97970

  • SHA1

    25f1c3f842ca345b5f7bb86e215c6899f0ed038f

  • SHA256

    9db0516f836e38aabdfaebfd08c5475a17ba21eb3b43c4d6d209ab4c143f5726

  • SHA512

    7912045b5672db6dafaa2e5c6914e0f1ba6e39667cc0c35a35cc594759827870d4a40e9acc1ae7078c8fd64a40c623da65405aca14d7fb620cf04c20a795a203

  • SSDEEP

    3072:2ajn2Zo/iJl88XE043iXv9MNm0ISbfGDLon4+m+tqPq:26nqmiD8800jbmJtoq

Malware Config

Targets

    • Target

      9100525baa0f4926aec1e7f28ea97970_NeikiAnalytics

    • Size

      155KB

    • MD5

      9100525baa0f4926aec1e7f28ea97970

    • SHA1

      25f1c3f842ca345b5f7bb86e215c6899f0ed038f

    • SHA256

      9db0516f836e38aabdfaebfd08c5475a17ba21eb3b43c4d6d209ab4c143f5726

    • SHA512

      7912045b5672db6dafaa2e5c6914e0f1ba6e39667cc0c35a35cc594759827870d4a40e9acc1ae7078c8fd64a40c623da65405aca14d7fb620cf04c20a795a203

    • SSDEEP

      3072:2ajn2Zo/iJl88XE043iXv9MNm0ISbfGDLon4+m+tqPq:26nqmiD8800jbmJtoq

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks