General

  • Target

    4a16ccbdb6a101efe0225abe2f90fe00_NeikiAnalytics

  • Size

    127KB

  • Sample

    240510-xmcbqsfc66

  • MD5

    4a16ccbdb6a101efe0225abe2f90fe00

  • SHA1

    b1c2816562de433bb0919ac45cef5fa8ed578598

  • SHA256

    3533fadcb2911b7458ab75b9ddd0b49cb318f04de41a38f548d0ee46501e2cf8

  • SHA512

    115af3db98518f2e5e0627b4862e3233bd66e55d410dbaba68fb426520cb9db10694e3f3267f8ca4d66295b70e3bce6cb8c2ffb2300e17017cb54a9714bfa23f

  • SSDEEP

    3072:6OjWuyt0ZHqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPL:6IH9OKofHfHTXQLzgvnzHPowYbvrjD/O

Malware Config

Targets

    • Target

      4a16ccbdb6a101efe0225abe2f90fe00_NeikiAnalytics

    • Size

      127KB

    • MD5

      4a16ccbdb6a101efe0225abe2f90fe00

    • SHA1

      b1c2816562de433bb0919ac45cef5fa8ed578598

    • SHA256

      3533fadcb2911b7458ab75b9ddd0b49cb318f04de41a38f548d0ee46501e2cf8

    • SHA512

      115af3db98518f2e5e0627b4862e3233bd66e55d410dbaba68fb426520cb9db10694e3f3267f8ca4d66295b70e3bce6cb8c2ffb2300e17017cb54a9714bfa23f

    • SSDEEP

      3072:6OjWuyt0ZHqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPL:6IH9OKofHfHTXQLzgvnzHPowYbvrjD/O

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks