General

  • Target

    21aa399396f8a048b68d0f33ca893460_NeikiAnalytics

  • Size

    1.2MB

  • Sample

    240512-seepnsbe31

  • MD5

    21aa399396f8a048b68d0f33ca893460

  • SHA1

    c8a01ea34dc8b6b2af78c465e364d221dbb4aea8

  • SHA256

    863db3e7d8a03e62707e4e47c72275a3a3c9ad148bce2eabb836ceff34046482

  • SHA512

    4b9ef6a1b2933b272b6a27e6f8024fe496ad2077a561702cc8afb6ef3c54c04b4b6e895c33bb0c9a31231245a2578058b09e5f92f46204ab566924fa389ad7a9

  • SSDEEP

    24576:YogqpDtfhK3k+PwXMU727mfT5kFg04ZUf0v85xwjaRqh3BXh9QxY:X9FZb+FU7qm75ughQxOaRE31huxY

Malware Config

Targets

    • Target

      21aa399396f8a048b68d0f33ca893460_NeikiAnalytics

    • Size

      1.2MB

    • MD5

      21aa399396f8a048b68d0f33ca893460

    • SHA1

      c8a01ea34dc8b6b2af78c465e364d221dbb4aea8

    • SHA256

      863db3e7d8a03e62707e4e47c72275a3a3c9ad148bce2eabb836ceff34046482

    • SHA512

      4b9ef6a1b2933b272b6a27e6f8024fe496ad2077a561702cc8afb6ef3c54c04b4b6e895c33bb0c9a31231245a2578058b09e5f92f46204ab566924fa389ad7a9

    • SSDEEP

      24576:YogqpDtfhK3k+PwXMU727mfT5kFg04ZUf0v85xwjaRqh3BXh9QxY:X9FZb+FU7qm75ughQxOaRE31huxY

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks