General

  • Target

    69b3fa9178413a7842c3d639eb7e1550_NeikiAnalytics

  • Size

    295KB

  • Sample

    240511-ds4tdsad4w

  • MD5

    69b3fa9178413a7842c3d639eb7e1550

  • SHA1

    b334222b31de4d32aff6d7035d0d1e08278d4f76

  • SHA256

    e27c452e9845ffe58aa7e09c28e81f9010562fb80fdd191eca8adb08d7a8ea73

  • SHA512

    82ebc83249e58464b1df8cab2e70c93278eac77b0a5083400202e14c2da465217200951cbb9d4f0bb22b87672b889caf410bfd3404a5c1496d640a7f517e7407

  • SSDEEP

    6144:YjluQoSPIo5R4nM/40yJNnwGylRAYgqiW2bwB+KPJwaGFbzmNVnQGLTt9UTs7+l2:YEQoSpqh+GyDAbqiSBbPJAF/mNV5TtaM

Malware Config

Targets

    • Target

      69b3fa9178413a7842c3d639eb7e1550_NeikiAnalytics

    • Size

      295KB

    • MD5

      69b3fa9178413a7842c3d639eb7e1550

    • SHA1

      b334222b31de4d32aff6d7035d0d1e08278d4f76

    • SHA256

      e27c452e9845ffe58aa7e09c28e81f9010562fb80fdd191eca8adb08d7a8ea73

    • SHA512

      82ebc83249e58464b1df8cab2e70c93278eac77b0a5083400202e14c2da465217200951cbb9d4f0bb22b87672b889caf410bfd3404a5c1496d640a7f517e7407

    • SSDEEP

      6144:YjluQoSPIo5R4nM/40yJNnwGylRAYgqiW2bwB+KPJwaGFbzmNVnQGLTt9UTs7+l2:YEQoSpqh+GyDAbqiSBbPJAF/mNV5TtaM

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks