General

  • Target

    b1928ebf1d860c23e4a53effa8cf5710_NeikiAnalytics

  • Size

    1.5MB

  • Sample

    240513-l8xc9aag49

  • MD5

    b1928ebf1d860c23e4a53effa8cf5710

  • SHA1

    22ca636a1c40dca187c5abee741a4fdfe2821bd1

  • SHA256

    fc407453437a6fed0f48805b2e8511f54801faba1ee7f0eab3efb80a9e76ef6e

  • SHA512

    1be4fd27432667f6b6bcbc8efc4fb4fdd89560dc562088b3c249b2b53f14b336560a918cb86309753f8f5c04dc48955c47fdcbd5622186844a65f1ecf5ca960f

  • SSDEEP

    24576:ZFsJeJLgY4u+q0vIyAgyr4DmzooUgiFPXM8h2qIwYUY/8p7PlQAuhC7Du85xyXyM:33JLgDzLgV0DlgQXrpLUG7AC/iyjjE

Malware Config

Targets

    • Target

      b1928ebf1d860c23e4a53effa8cf5710_NeikiAnalytics

    • Size

      1.5MB

    • MD5

      b1928ebf1d860c23e4a53effa8cf5710

    • SHA1

      22ca636a1c40dca187c5abee741a4fdfe2821bd1

    • SHA256

      fc407453437a6fed0f48805b2e8511f54801faba1ee7f0eab3efb80a9e76ef6e

    • SHA512

      1be4fd27432667f6b6bcbc8efc4fb4fdd89560dc562088b3c249b2b53f14b336560a918cb86309753f8f5c04dc48955c47fdcbd5622186844a65f1ecf5ca960f

    • SSDEEP

      24576:ZFsJeJLgY4u+q0vIyAgyr4DmzooUgiFPXM8h2qIwYUY/8p7PlQAuhC7Du85xyXyM:33JLgDzLgV0DlgQXrpLUG7AC/iyjjE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks