General

  • Target

    aac1a036a2c4e76de6d433773c8156a0_NeikiAnalytics

  • Size

    1.4MB

  • Sample

    240510-j2gm4sfe39

  • MD5

    aac1a036a2c4e76de6d433773c8156a0

  • SHA1

    4f8b7b3f6e4b18e4b702be36f93d260926f6cdc7

  • SHA256

    441ed400b566bc985d20a85adb60690c2f7a29c3d7486e432331b22c8283e496

  • SHA512

    48afe9c6750310466ca281d67bc2123f53f80d554971f72eaad43cc2e0e309716b299a7792fbf85614da222d2bb0601028f9d2ac7ffcdb0a941fab0c56812245

  • SSDEEP

    24576:sSLW2SP5x6vmR7+tvZ05iXmCVO1S3xEmbiOwHkNxBZm5rhjfYjPvT7q:sCYx6v5i1bTOhHINhUjPv3q

Malware Config

Targets

    • Target

      aac1a036a2c4e76de6d433773c8156a0_NeikiAnalytics

    • Size

      1.4MB

    • MD5

      aac1a036a2c4e76de6d433773c8156a0

    • SHA1

      4f8b7b3f6e4b18e4b702be36f93d260926f6cdc7

    • SHA256

      441ed400b566bc985d20a85adb60690c2f7a29c3d7486e432331b22c8283e496

    • SHA512

      48afe9c6750310466ca281d67bc2123f53f80d554971f72eaad43cc2e0e309716b299a7792fbf85614da222d2bb0601028f9d2ac7ffcdb0a941fab0c56812245

    • SSDEEP

      24576:sSLW2SP5x6vmR7+tvZ05iXmCVO1S3xEmbiOwHkNxBZm5rhjfYjPvT7q:sCYx6v5i1bTOhHINhUjPv3q

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks