General

  • Target

    c2155533eab8f02d238e28c6311bcaf0_NeikiAnalytics

  • Size

    1.7MB

  • Sample

    240510-mde16aha8w

  • MD5

    c2155533eab8f02d238e28c6311bcaf0

  • SHA1

    db6779c5cdf00948a8d80ed27e9ef84df011062b

  • SHA256

    42a2c734fc34651b2e2e18c16e2b8220be34d5c2268ef83ad3a26e68854db5ce

  • SHA512

    a7cd95c0a816647ec4b61dacc88f8317071f5ed223959e0ebf46a3a021f657eb3f6f3ae8a637e5f77f4f0170b8434d9b07466f27a519ba9cb1b96aa935440110

  • SSDEEP

    24576:YoOULzFKXortjL7wBYg5WVTmgo4FZFl+tWN/80inBXVZp+Ok+67QpcuhKFKyKrV:XOwK4rtjuV5wT04FV4F0iXZp6f0a0rV

Malware Config

Targets

    • Target

      c2155533eab8f02d238e28c6311bcaf0_NeikiAnalytics

    • Size

      1.7MB

    • MD5

      c2155533eab8f02d238e28c6311bcaf0

    • SHA1

      db6779c5cdf00948a8d80ed27e9ef84df011062b

    • SHA256

      42a2c734fc34651b2e2e18c16e2b8220be34d5c2268ef83ad3a26e68854db5ce

    • SHA512

      a7cd95c0a816647ec4b61dacc88f8317071f5ed223959e0ebf46a3a021f657eb3f6f3ae8a637e5f77f4f0170b8434d9b07466f27a519ba9cb1b96aa935440110

    • SSDEEP

      24576:YoOULzFKXortjL7wBYg5WVTmgo4FZFl+tWN/80inBXVZp+Ok+67QpcuhKFKyKrV:XOwK4rtjuV5wT04FV4F0iXZp6f0a0rV

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks