General

  • Target

    a3bd5945c1d34fe5aa13f7a67c606e20_NeikiAnalytics

  • Size

    1.5MB

  • Sample

    240511-jtqk2shh26

  • MD5

    a3bd5945c1d34fe5aa13f7a67c606e20

  • SHA1

    6edf4001858bff9423c906263b8cd68a6cf82d28

  • SHA256

    2d8f693338cab189d7a582ba27d0929c1e2c5b2f3af329d294884a142a80ab8f

  • SHA512

    3ab234f0fe5553a8fb9eb11316c1989d7d9ebfba487a17b52d33e1e0686c6ff61fa80117c94b310ad3ad07f40d203fa826b698afb6a0848e4768070b19b5ee20

  • SSDEEP

    24576:A84ZePyDC5gQlhk7+DYFQ/ndxepL5r2aQywgqgSQ7+zB0Gl4BuRGzMArYIa:A28CqQrkQPdcB5r2NIqPQQiBgj

Malware Config

Targets

    • Target

      a3bd5945c1d34fe5aa13f7a67c606e20_NeikiAnalytics

    • Size

      1.5MB

    • MD5

      a3bd5945c1d34fe5aa13f7a67c606e20

    • SHA1

      6edf4001858bff9423c906263b8cd68a6cf82d28

    • SHA256

      2d8f693338cab189d7a582ba27d0929c1e2c5b2f3af329d294884a142a80ab8f

    • SHA512

      3ab234f0fe5553a8fb9eb11316c1989d7d9ebfba487a17b52d33e1e0686c6ff61fa80117c94b310ad3ad07f40d203fa826b698afb6a0848e4768070b19b5ee20

    • SSDEEP

      24576:A84ZePyDC5gQlhk7+DYFQ/ndxepL5r2aQywgqgSQ7+zB0Gl4BuRGzMArYIa:A28CqQrkQPdcB5r2NIqPQQiBgj

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks