General

  • Target

    3dd828410c92c4ec67da93e962235990_NeikiAnalytics

  • Size

    825KB

  • Sample

    240511-awp8maah7v

  • MD5

    3dd828410c92c4ec67da93e962235990

  • SHA1

    abe5f839108d4e2bc71fec604565f772f1561535

  • SHA256

    7459c1fe556ae3cf94a373eaf2b0dfe9dab591beb8bd81dd629a0c3233b01e97

  • SHA512

    b4d58879256e13b693f501e6c110cee081a07ee9b9c30c5af0c14af65fa66eb4c5737092941f7312c3033794a33f09f5284e86580257f212070d57f5d9274974

  • SSDEEP

    24576:lq8YZLd6ao4fnOM+whYZZ7wkj0x8LOuRJoJBNR:/jOPhYTUkLiuRqz

Malware Config

Targets

    • Target

      3dd828410c92c4ec67da93e962235990_NeikiAnalytics

    • Size

      825KB

    • MD5

      3dd828410c92c4ec67da93e962235990

    • SHA1

      abe5f839108d4e2bc71fec604565f772f1561535

    • SHA256

      7459c1fe556ae3cf94a373eaf2b0dfe9dab591beb8bd81dd629a0c3233b01e97

    • SHA512

      b4d58879256e13b693f501e6c110cee081a07ee9b9c30c5af0c14af65fa66eb4c5737092941f7312c3033794a33f09f5284e86580257f212070d57f5d9274974

    • SSDEEP

      24576:lq8YZLd6ao4fnOM+whYZZ7wkj0x8LOuRJoJBNR:/jOPhYTUkLiuRqz

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks