General

  • Target

    c277aa6cf7e16718c425a79b6e9527c0_NeikiAnalytics

  • Size

    75KB

  • Sample

    240514-mbdejsca28

  • MD5

    c277aa6cf7e16718c425a79b6e9527c0

  • SHA1

    be5b04ada2c973bb565334a09033322d0151b4eb

  • SHA256

    1f439aae1dad07658f980e868f0b45758c30d115edc49eafc92a2800d7101b4e

  • SHA512

    e2fcc7eb2fadd4f3ce3da6495826a002b0e0d5ca62f9bb2799718a9bb94e81969fb2b13bae1562cd0d99bd5c8755a6d2951dcedd4a6a48c019221f3ddbd27372

  • SSDEEP

    1536:Yx1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3v:QOjWuyt0ZsqsXOKofHfHTXQLzgvnzHP3

Malware Config

Targets

    • Target

      c277aa6cf7e16718c425a79b6e9527c0_NeikiAnalytics

    • Size

      75KB

    • MD5

      c277aa6cf7e16718c425a79b6e9527c0

    • SHA1

      be5b04ada2c973bb565334a09033322d0151b4eb

    • SHA256

      1f439aae1dad07658f980e868f0b45758c30d115edc49eafc92a2800d7101b4e

    • SHA512

      e2fcc7eb2fadd4f3ce3da6495826a002b0e0d5ca62f9bb2799718a9bb94e81969fb2b13bae1562cd0d99bd5c8755a6d2951dcedd4a6a48c019221f3ddbd27372

    • SSDEEP

      1536:Yx1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3v:QOjWuyt0ZsqsXOKofHfHTXQLzgvnzHP3

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks