General

  • Target

    bf25d0fec93985bde03765c86af798c0_NeikiAnalytics

  • Size

    320KB

  • Sample

    240513-vn67dseh7x

  • MD5

    bf25d0fec93985bde03765c86af798c0

  • SHA1

    1a571b863d34d1f422c9cc8cfedd024d471286f9

  • SHA256

    5deb82fcfe3cdd0fe0b4084291d8b4a24bf49e79df28526f5192f413dfd2a462

  • SHA512

    97ce609b80e9ed13471a0a6d20d377755547dd2a5b6b6a4d7e906bed6d00e7764e94edfa0edee88a1198c70550a878055392a6e0d5dc9474b092d4464c50a4fd

  • SSDEEP

    6144:7tatPE5TxP8ev1zQBgexOdw6rpI9FsAC9:oPwTt8Cl+zGp64

Malware Config

Targets

    • Target

      bf25d0fec93985bde03765c86af798c0_NeikiAnalytics

    • Size

      320KB

    • MD5

      bf25d0fec93985bde03765c86af798c0

    • SHA1

      1a571b863d34d1f422c9cc8cfedd024d471286f9

    • SHA256

      5deb82fcfe3cdd0fe0b4084291d8b4a24bf49e79df28526f5192f413dfd2a462

    • SHA512

      97ce609b80e9ed13471a0a6d20d377755547dd2a5b6b6a4d7e906bed6d00e7764e94edfa0edee88a1198c70550a878055392a6e0d5dc9474b092d4464c50a4fd

    • SSDEEP

      6144:7tatPE5TxP8ev1zQBgexOdw6rpI9FsAC9:oPwTt8Cl+zGp64

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks