General

  • Target

    202f133d6daf299a84bbdd671a076ff0_NeikiAnalytics

  • Size

    999KB

  • Sample

    240511-vs87jsha2v

  • MD5

    202f133d6daf299a84bbdd671a076ff0

  • SHA1

    499815bb5f984f0d1081581fc0d6a8611c80835f

  • SHA256

    f2e3094b08c3842d25211e4ed41d193507c4492dfcbf66d55519545a28c65b9c

  • SHA512

    312f186870b4f626fe8163e7947f7f3bdc17b0b315f47b54d4e51c28c2c43238d83c470467921a3bf005e7cbe2fcb18cc498d1e2ea55ded1795279882c533b8a

  • SSDEEP

    24576:86SzSrYugYOCIIU+HDK943RMyAg2Lr4qUD6rPMZIS3TaqaaoV:5SyeYOZc35H23S8PsIkFaLV

Malware Config

Targets

    • Target

      202f133d6daf299a84bbdd671a076ff0_NeikiAnalytics

    • Size

      999KB

    • MD5

      202f133d6daf299a84bbdd671a076ff0

    • SHA1

      499815bb5f984f0d1081581fc0d6a8611c80835f

    • SHA256

      f2e3094b08c3842d25211e4ed41d193507c4492dfcbf66d55519545a28c65b9c

    • SHA512

      312f186870b4f626fe8163e7947f7f3bdc17b0b315f47b54d4e51c28c2c43238d83c470467921a3bf005e7cbe2fcb18cc498d1e2ea55ded1795279882c533b8a

    • SSDEEP

      24576:86SzSrYugYOCIIU+HDK943RMyAg2Lr4qUD6rPMZIS3TaqaaoV:5SyeYOZc35H23S8PsIkFaLV

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks