General

  • Target

    65e99e7e80a53b31a6648ead10acd0f0_NeikiAnalytics

  • Size

    140KB

  • Sample

    240511-dlynsshg6z

  • MD5

    65e99e7e80a53b31a6648ead10acd0f0

  • SHA1

    eb8606e4337a7860316b8aec539294fca71e6cb3

  • SHA256

    85c692aca941e54f0cebb1f5a59585367e5f81e44fff8c55b841f5c94b7d6314

  • SHA512

    0a9ee6da12cb17403debbf3b4670a6ca1fd5059d8bb33aff911a69b017349a21847382fd4aa0388c691ff741a09433d49cd94f003a5d70c8d5aacc95a2c0e268

  • SSDEEP

    1536:0rRVCaKgzbLc54hukfgvYnouy8F/VW7nSm70zBVG/1pw5ZtwuL8UlS:0ljbLl/gvQoutFg70zzG/1e2zH

Malware Config

Targets

    • Target

      65e99e7e80a53b31a6648ead10acd0f0_NeikiAnalytics

    • Size

      140KB

    • MD5

      65e99e7e80a53b31a6648ead10acd0f0

    • SHA1

      eb8606e4337a7860316b8aec539294fca71e6cb3

    • SHA256

      85c692aca941e54f0cebb1f5a59585367e5f81e44fff8c55b841f5c94b7d6314

    • SHA512

      0a9ee6da12cb17403debbf3b4670a6ca1fd5059d8bb33aff911a69b017349a21847382fd4aa0388c691ff741a09433d49cd94f003a5d70c8d5aacc95a2c0e268

    • SSDEEP

      1536:0rRVCaKgzbLc54hukfgvYnouy8F/VW7nSm70zBVG/1pw5ZtwuL8UlS:0ljbLl/gvQoutFg70zzG/1e2zH

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks