General

  • Target

    11f0bdaeae9aff835db31d1b59abf020_NeikiAnalytics

  • Size

    2.0MB

  • Sample

    240511-sgx9ssfg25

  • MD5

    11f0bdaeae9aff835db31d1b59abf020

  • SHA1

    746ece79b72ec4bf95a3ede0f7783c00601551fe

  • SHA256

    65444b44794e11f4fa280da937accfde9155c0fd1779db1fbd0097064f67e7d7

  • SHA512

    8d55c284711ea3de25cb724e662ad84e91c8b8e2ec65daf80ff6be92375641810ef88ab9d8e9c8368fca2b425b1d38030bf142079e954ba581746904e4977c5c

  • SSDEEP

    49152:+fPJlcqsR5jvW4Ces4H32u430U3wk/VwlTZ:+fPXclRJvW4e4H1l8wYw3

Malware Config

Targets

    • Target

      11f0bdaeae9aff835db31d1b59abf020_NeikiAnalytics

    • Size

      2.0MB

    • MD5

      11f0bdaeae9aff835db31d1b59abf020

    • SHA1

      746ece79b72ec4bf95a3ede0f7783c00601551fe

    • SHA256

      65444b44794e11f4fa280da937accfde9155c0fd1779db1fbd0097064f67e7d7

    • SHA512

      8d55c284711ea3de25cb724e662ad84e91c8b8e2ec65daf80ff6be92375641810ef88ab9d8e9c8368fca2b425b1d38030bf142079e954ba581746904e4977c5c

    • SSDEEP

      49152:+fPJlcqsR5jvW4Ces4H32u430U3wk/VwlTZ:+fPXclRJvW4e4H1l8wYw3

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks