General

  • Target

    c5a27f0b35fef022fcfb528c7c77beb0_NeikiAnalytics

  • Size

    205KB

  • Sample

    240510-mm661ahf6w

  • MD5

    c5a27f0b35fef022fcfb528c7c77beb0

  • SHA1

    4a402677d71ba498ab44582e93580dfc61bb8194

  • SHA256

    7c310ba5fdcdf800170111a1def57c1e5ee12a07a9bc3a3423d25a0585b0dd28

  • SHA512

    65b7fb81f46ff49814a56cb56deeb99d3c1ee3db540eca4a415aab973f9c116f040fff0df81eca562d63fe34afc9e449e8f073e712803b6aabe715184f9966fb

  • SSDEEP

    3072:6AjRZgZnTmwEBMmul5pn9iLDOF3py0xfReEgz35lP+P/QQhCowF73:XZGniwLl5uLDOxFeEgtiQQhCowR

Malware Config

Targets

    • Target

      c5a27f0b35fef022fcfb528c7c77beb0_NeikiAnalytics

    • Size

      205KB

    • MD5

      c5a27f0b35fef022fcfb528c7c77beb0

    • SHA1

      4a402677d71ba498ab44582e93580dfc61bb8194

    • SHA256

      7c310ba5fdcdf800170111a1def57c1e5ee12a07a9bc3a3423d25a0585b0dd28

    • SHA512

      65b7fb81f46ff49814a56cb56deeb99d3c1ee3db540eca4a415aab973f9c116f040fff0df81eca562d63fe34afc9e449e8f073e712803b6aabe715184f9966fb

    • SSDEEP

      3072:6AjRZgZnTmwEBMmul5pn9iLDOF3py0xfReEgz35lP+P/QQhCowF73:XZGniwLl5uLDOxFeEgtiQQhCowR

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (64) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks