General

  • Target

    6c1dc757f23353aa6ee5793a66f48cc0_NeikiAnalytics

  • Size

    1.6MB

  • Sample

    240511-dy6j6sde34

  • MD5

    6c1dc757f23353aa6ee5793a66f48cc0

  • SHA1

    3845630fffbd7dd2655ecc97f31d7b1ebb66a9e9

  • SHA256

    1d576b0069a9fc45450ba64a99186a3b4456237cd6f5f62932421a01583ce3a9

  • SHA512

    bce7e155d0eec0855723841b735ea308ce89df64a7c9839a8718d523c8e31c8c5b1f6bce387fc773ba334a6ae2de1404c27cc76a8c93560f7a7a2cb1516ac8fe

  • SSDEEP

    49152:sEJe+GuWeUbYJUqnYtobqTyrko32FsaaY:sEJe+S0JZYObCKf32FIY

Malware Config

Targets

    • Target

      6c1dc757f23353aa6ee5793a66f48cc0_NeikiAnalytics

    • Size

      1.6MB

    • MD5

      6c1dc757f23353aa6ee5793a66f48cc0

    • SHA1

      3845630fffbd7dd2655ecc97f31d7b1ebb66a9e9

    • SHA256

      1d576b0069a9fc45450ba64a99186a3b4456237cd6f5f62932421a01583ce3a9

    • SHA512

      bce7e155d0eec0855723841b735ea308ce89df64a7c9839a8718d523c8e31c8c5b1f6bce387fc773ba334a6ae2de1404c27cc76a8c93560f7a7a2cb1516ac8fe

    • SSDEEP

      49152:sEJe+GuWeUbYJUqnYtobqTyrko32FsaaY:sEJe+S0JZYObCKf32FIY

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks