General

  • Target

    addbaf1e2cab3efa1fb1e7f49e0de510_NeikiAnalytics

  • Size

    288KB

  • Sample

    240510-ksrbmadf3w

  • MD5

    addbaf1e2cab3efa1fb1e7f49e0de510

  • SHA1

    b50df89de6775beb8232140dc2cbef120cd6b5f3

  • SHA256

    fdbe1ac0be100c0da95bcca568de2406355c0947c9873460c21da9a291d716a6

  • SHA512

    aea82fb60b083b1d70976e229bae8dd6c59c7599361aef570c28e7a8266602d329dc7fe6fee4445e3796fd0e7ce71e828d64c55f149df4c21496b7c5a033f684

  • SSDEEP

    6144:VjluQoSv4DSIo5R4nM/40yPiL0C8IA9znwEBfUxifU/0c1xERs82BC9co:VEQoSfqHiAC8IkzwWt6EsPol

Malware Config

Targets

    • Target

      addbaf1e2cab3efa1fb1e7f49e0de510_NeikiAnalytics

    • Size

      288KB

    • MD5

      addbaf1e2cab3efa1fb1e7f49e0de510

    • SHA1

      b50df89de6775beb8232140dc2cbef120cd6b5f3

    • SHA256

      fdbe1ac0be100c0da95bcca568de2406355c0947c9873460c21da9a291d716a6

    • SHA512

      aea82fb60b083b1d70976e229bae8dd6c59c7599361aef570c28e7a8266602d329dc7fe6fee4445e3796fd0e7ce71e828d64c55f149df4c21496b7c5a033f684

    • SSDEEP

      6144:VjluQoSv4DSIo5R4nM/40yPiL0C8IA9znwEBfUxifU/0c1xERs82BC9co:VEQoSfqHiAC8IkzwWt6EsPol

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks