General

  • Target

    e92aeaef8f223b3b32b32678ba737270_NeikiAnalytics

  • Size

    785KB

  • Sample

    240510-qbhwtabd23

  • MD5

    e92aeaef8f223b3b32b32678ba737270

  • SHA1

    e4ab3f0bbecbca0a4fafc812f08f775644f28832

  • SHA256

    366069ef275c726b82f6dd9796f6efa260d4a4fb8676a51843e2436d0a897359

  • SHA512

    30b1ca2cb342cfcc02a29693958e815d03cf14e2cba2cb363cce3e8fb7fc8294da713b9c2b5e687848507ec24db2a12cfc3bcd33ec1b804c9becacda3b0f08a5

  • SSDEEP

    24576:bHu7ndnT8f+6AewDKun1jAjOwSuc37bJfY8:jEnfCwDKun1k5PcLbJfY8

Malware Config

Targets

    • Target

      e92aeaef8f223b3b32b32678ba737270_NeikiAnalytics

    • Size

      785KB

    • MD5

      e92aeaef8f223b3b32b32678ba737270

    • SHA1

      e4ab3f0bbecbca0a4fafc812f08f775644f28832

    • SHA256

      366069ef275c726b82f6dd9796f6efa260d4a4fb8676a51843e2436d0a897359

    • SHA512

      30b1ca2cb342cfcc02a29693958e815d03cf14e2cba2cb363cce3e8fb7fc8294da713b9c2b5e687848507ec24db2a12cfc3bcd33ec1b804c9becacda3b0f08a5

    • SSDEEP

      24576:bHu7ndnT8f+6AewDKun1jAjOwSuc37bJfY8:jEnfCwDKun1k5PcLbJfY8

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks