General

  • Target

    8abd4c0d9755b90fa6e1476908792440_NeikiAnalytics

  • Size

    887KB

  • Sample

    240511-gdjfpagd6v

  • MD5

    8abd4c0d9755b90fa6e1476908792440

  • SHA1

    e71bd3d5b432bc3d7c461681b71283c6589d7120

  • SHA256

    4967d9da640233b28d15e2b887083f9be7e9f47005619014e60cf937bc31b780

  • SHA512

    1c465eb608b3d293b53e63b4d78945f8ba2c42d7b74e1fd99b91046be46c4da18ad6f9930f902c9308c376851dcab374cf03240e91bd88bed6a7c11c942255c3

  • SSDEEP

    24576:VG3NTr0vmeOG4HwEkwilR4X+1LnM2t2qFhRn9avYt2:I3FgOet4HFIlR4XW4+nyF

Malware Config

Targets

    • Target

      8abd4c0d9755b90fa6e1476908792440_NeikiAnalytics

    • Size

      887KB

    • MD5

      8abd4c0d9755b90fa6e1476908792440

    • SHA1

      e71bd3d5b432bc3d7c461681b71283c6589d7120

    • SHA256

      4967d9da640233b28d15e2b887083f9be7e9f47005619014e60cf937bc31b780

    • SHA512

      1c465eb608b3d293b53e63b4d78945f8ba2c42d7b74e1fd99b91046be46c4da18ad6f9930f902c9308c376851dcab374cf03240e91bd88bed6a7c11c942255c3

    • SSDEEP

      24576:VG3NTr0vmeOG4HwEkwilR4X+1LnM2t2qFhRn9avYt2:I3FgOet4HFIlR4XW4+nyF

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks