General

  • Target

    a65f484d74b8a95687959090b87f3140_NeikiAnalytics

  • Size

    119KB

  • Sample

    240511-j4abtaga6t

  • MD5

    a65f484d74b8a95687959090b87f3140

  • SHA1

    a2b9c70169d83854106ffa999e18ce74938e3aa1

  • SHA256

    feca35e6eb379f5f95b61ea40f614aff7f04f3c7ba254c4525374cd9a4788431

  • SHA512

    530156a9a9239b1b4b03e9ec0d2cf1f3e3603ffbd71b5dbf6c86c428b325d979390c64519eef3761084240aa62039313ddc413725f2f9bc7cd9b5c3bfba5cb39

  • SSDEEP

    3072:vOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:vIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Targets

    • Target

      a65f484d74b8a95687959090b87f3140_NeikiAnalytics

    • Size

      119KB

    • MD5

      a65f484d74b8a95687959090b87f3140

    • SHA1

      a2b9c70169d83854106ffa999e18ce74938e3aa1

    • SHA256

      feca35e6eb379f5f95b61ea40f614aff7f04f3c7ba254c4525374cd9a4788431

    • SHA512

      530156a9a9239b1b4b03e9ec0d2cf1f3e3603ffbd71b5dbf6c86c428b325d979390c64519eef3761084240aa62039313ddc413725f2f9bc7cd9b5c3bfba5cb39

    • SSDEEP

      3072:vOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:vIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks