General

  • Target

    5aa38effea41576509cdbdda82ed95f0_NeikiAnalytics

  • Size

    1.9MB

  • Sample

    240512-chdzjsed43

  • MD5

    5aa38effea41576509cdbdda82ed95f0

  • SHA1

    86bfa7ebcf8b1c9ac1a36e34ca6a133b6ac77b9e

  • SHA256

    a435b3a43a2518d620d4fcb48081040cf18b28111fe806a34c6db07925089a62

  • SHA512

    4828d2e123bb307bc8877a764cdd04cb9fb193d7923f4cbcd5438675b678896a988ff93e486223adfc88a6b0f7a0a9129e5f6e371ee96688baf680c43dd04620

  • SSDEEP

    49152:jwVJrPY2Cs7e/iYk8fWvsPBbgc2g2SVYdj/rQegI2Uhm/K:jwTrPY1SYpb8ga5xz2Ul

Malware Config

Targets

    • Target

      5aa38effea41576509cdbdda82ed95f0_NeikiAnalytics

    • Size

      1.9MB

    • MD5

      5aa38effea41576509cdbdda82ed95f0

    • SHA1

      86bfa7ebcf8b1c9ac1a36e34ca6a133b6ac77b9e

    • SHA256

      a435b3a43a2518d620d4fcb48081040cf18b28111fe806a34c6db07925089a62

    • SHA512

      4828d2e123bb307bc8877a764cdd04cb9fb193d7923f4cbcd5438675b678896a988ff93e486223adfc88a6b0f7a0a9129e5f6e371ee96688baf680c43dd04620

    • SSDEEP

      49152:jwVJrPY2Cs7e/iYk8fWvsPBbgc2g2SVYdj/rQegI2Uhm/K:jwTrPY1SYpb8ga5xz2Ul

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks