General

  • Target

    352fda05a0e9d745f31ed975325d7910_NeikiAnalytics

  • Size

    624KB

  • Sample

    240512-vxr4tsba28

  • MD5

    352fda05a0e9d745f31ed975325d7910

  • SHA1

    69e2c74fea64acef27f0b962f64eb51e7954f79a

  • SHA256

    900f712b1d3d0b14b5fcaf64203a32a639f802b6bbe44d098c4163436b17fa2b

  • SHA512

    4d5733f1c8743ba194f652d94cf8306d6ea4d15abeb2ea5dd993c59a0cde624d071d665199af1bda952fd337bf2a1debadddb14508e3b53673a3f640472d4949

  • SSDEEP

    12288:oGHasii9BKTLvPu4ZfWbKAlF6z2Y4GuSuCTwkbfz/E/h1:86KbZflCYLu0b/E/H

Malware Config

Targets

    • Target

      352fda05a0e9d745f31ed975325d7910_NeikiAnalytics

    • Size

      624KB

    • MD5

      352fda05a0e9d745f31ed975325d7910

    • SHA1

      69e2c74fea64acef27f0b962f64eb51e7954f79a

    • SHA256

      900f712b1d3d0b14b5fcaf64203a32a639f802b6bbe44d098c4163436b17fa2b

    • SHA512

      4d5733f1c8743ba194f652d94cf8306d6ea4d15abeb2ea5dd993c59a0cde624d071d665199af1bda952fd337bf2a1debadddb14508e3b53673a3f640472d4949

    • SSDEEP

      12288:oGHasii9BKTLvPu4ZfWbKAlF6z2Y4GuSuCTwkbfz/E/h1:86KbZflCYLu0b/E/H

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks