General

  • Target

    c220ba7a195346305055bfbaba8967a0_NeikiAnalytics

  • Size

    255KB

  • Sample

    240514-l5skwsbf94

  • MD5

    c220ba7a195346305055bfbaba8967a0

  • SHA1

    122db03b324b9c1f6ec0f099c82e02706f5bd5c8

  • SHA256

    cad4dd0e8778cd1de06fd5114cbdad861b3fc1d3cc8714374e54f1b73bf9486d

  • SHA512

    89d6645a43eeab8a3049ff70c17d62d63c9be91b3fcf07d9418fc69d646c8640816543c6b1971e3fe8a83508b62d5405f5a692a1808ee0142e51e51abeea6cf3

  • SSDEEP

    3072:hYBvwyDZ38T+rtluLsDy/mi41O1WKuTud+t2VvNVvA7sK9hC3g:hYKC6+rtluLsmWOhuumX9A3g

Malware Config

Targets

    • Target

      c220ba7a195346305055bfbaba8967a0_NeikiAnalytics

    • Size

      255KB

    • MD5

      c220ba7a195346305055bfbaba8967a0

    • SHA1

      122db03b324b9c1f6ec0f099c82e02706f5bd5c8

    • SHA256

      cad4dd0e8778cd1de06fd5114cbdad861b3fc1d3cc8714374e54f1b73bf9486d

    • SHA512

      89d6645a43eeab8a3049ff70c17d62d63c9be91b3fcf07d9418fc69d646c8640816543c6b1971e3fe8a83508b62d5405f5a692a1808ee0142e51e51abeea6cf3

    • SSDEEP

      3072:hYBvwyDZ38T+rtluLsDy/mi41O1WKuTud+t2VvNVvA7sK9hC3g:hYKC6+rtluLsmWOhuumX9A3g

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (88) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks