General

  • Target

    a399eed0c4dd11af12dea206da153720_NeikiAnalytics

  • Size

    974KB

  • Sample

    240513-hrlcwabd3w

  • MD5

    a399eed0c4dd11af12dea206da153720

  • SHA1

    1387e4566329821425eac23781c7a31c685a52b5

  • SHA256

    82689de2cb419bf33c9053e403678e31ea32bc4e1417410a9996658fe237cb97

  • SHA512

    7dd0827acff9a2616e8a3165629800515968bee5fefd06059c864a52beae7b77de201cd89db895a537b89617c1ad4c0f8d86beaaafd5dbdc2e0d9bba4995d6f7

  • SSDEEP

    24576:oWIFyy5dAAbAp9izRsg3QuIpanPjyiLGT6GzuKFUM:VEyy5KAC9iziuIpyLPFGzraM

Malware Config

Targets

    • Target

      a399eed0c4dd11af12dea206da153720_NeikiAnalytics

    • Size

      974KB

    • MD5

      a399eed0c4dd11af12dea206da153720

    • SHA1

      1387e4566329821425eac23781c7a31c685a52b5

    • SHA256

      82689de2cb419bf33c9053e403678e31ea32bc4e1417410a9996658fe237cb97

    • SHA512

      7dd0827acff9a2616e8a3165629800515968bee5fefd06059c864a52beae7b77de201cd89db895a537b89617c1ad4c0f8d86beaaafd5dbdc2e0d9bba4995d6f7

    • SSDEEP

      24576:oWIFyy5dAAbAp9izRsg3QuIpanPjyiLGT6GzuKFUM:VEyy5KAC9iziuIpyLPFGzraM

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks