General

  • Target

    435ac708c8dea60fb6af8f4d879de360_NeikiAnalytics

  • Size

    442KB

  • Sample

    240511-2f6zzscb7y

  • MD5

    435ac708c8dea60fb6af8f4d879de360

  • SHA1

    0ecb5eb800714c2688d2c37135f052ba3666e8a5

  • SHA256

    28be6ee44f0edfdd5e0111c42974ad42aaeb4ccc46db805f55ad5c3b81b555d5

  • SHA512

    564e78bf855038ceed08c52e1b111fb1aea741ea55ef0b4d13832315369156f696181c0203af0432a3d86d5ec0b8a4e62316e7bbe4c9274533a64abc8fe8a1c8

  • SSDEEP

    6144:aDOxZXrSHXUTsczsC4/M+0iXIzMkZiaNDVaRXLB1kwt5FQhZFBTZQ76YaxPHHt1y:lXa8sc+fYQ4xoXRt52hZ3e7nQPHzoJ

Malware Config

Targets

    • Target

      435ac708c8dea60fb6af8f4d879de360_NeikiAnalytics

    • Size

      442KB

    • MD5

      435ac708c8dea60fb6af8f4d879de360

    • SHA1

      0ecb5eb800714c2688d2c37135f052ba3666e8a5

    • SHA256

      28be6ee44f0edfdd5e0111c42974ad42aaeb4ccc46db805f55ad5c3b81b555d5

    • SHA512

      564e78bf855038ceed08c52e1b111fb1aea741ea55ef0b4d13832315369156f696181c0203af0432a3d86d5ec0b8a4e62316e7bbe4c9274533a64abc8fe8a1c8

    • SSDEEP

      6144:aDOxZXrSHXUTsczsC4/M+0iXIzMkZiaNDVaRXLB1kwt5FQhZFBTZQ76YaxPHHt1y:lXa8sc+fYQ4xoXRt52hZ3e7nQPHzoJ

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks