General

  • Target

    1d621162c960363dc66ff9e866526960_NeikiAnalytics

  • Size

    482KB

  • Sample

    240513-z7xjhseg33

  • MD5

    1d621162c960363dc66ff9e866526960

  • SHA1

    e4e5fa50535660cc5c2434c3ece8e914fe2530bb

  • SHA256

    5161cb8966299ecaf5fc1e554008a1289166b23e3bab3b0572c26a31c6405d14

  • SHA512

    7c6c92d1623e05f1c106d1509806b49552117d9584d0eff48a612e60769e6c0866a26a092d51d7621f87c486f5b349a09b3e13272654401811a8e6cf140e2a89

  • SSDEEP

    6144:g5u5eG44AeJ2ssftlVN+zBfGrSWm+omDAgQsSygGG2IszA9B:Cu5eG4bsilNoGSJ+omDAdsWGLT8D

Malware Config

Targets

    • Target

      1d621162c960363dc66ff9e866526960_NeikiAnalytics

    • Size

      482KB

    • MD5

      1d621162c960363dc66ff9e866526960

    • SHA1

      e4e5fa50535660cc5c2434c3ece8e914fe2530bb

    • SHA256

      5161cb8966299ecaf5fc1e554008a1289166b23e3bab3b0572c26a31c6405d14

    • SHA512

      7c6c92d1623e05f1c106d1509806b49552117d9584d0eff48a612e60769e6c0866a26a092d51d7621f87c486f5b349a09b3e13272654401811a8e6cf140e2a89

    • SSDEEP

      6144:g5u5eG44AeJ2ssftlVN+zBfGrSWm+omDAgQsSygGG2IszA9B:Cu5eG4bsilNoGSJ+omDAdsWGLT8D

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks