General

  • Target

    660dc812d8d5178cfb0392a9dee7f120_NeikiAnalytics

  • Size

    71KB

  • Sample

    240515-c1fabsde49

  • MD5

    660dc812d8d5178cfb0392a9dee7f120

  • SHA1

    dc78f141ba56da179c9a3e4ecc0f81992c45b753

  • SHA256

    04c530dc6f64714c9a08cb8d4cbfe851d0263e9d15397d12ca07e3045f7a1945

  • SHA512

    d151a7345f5e887a35699bf9da0f126dd8bef0cee5562e0df18eb976c9ae21ff6ca27edc59fab9ba939e668a7bc668d4c5550f1533cfce2ba13ee1775accf683

  • SSDEEP

    768:qGHV45EDE477AZbUJx0rZGE3jCELoiMMj6hZ3nE+EXVmkDbjRL8Khc15Z6J1S:qG14P477AxUYrZGoC09k0SkTRHhWqP

Malware Config

Targets

    • Target

      660dc812d8d5178cfb0392a9dee7f120_NeikiAnalytics

    • Size

      71KB

    • MD5

      660dc812d8d5178cfb0392a9dee7f120

    • SHA1

      dc78f141ba56da179c9a3e4ecc0f81992c45b753

    • SHA256

      04c530dc6f64714c9a08cb8d4cbfe851d0263e9d15397d12ca07e3045f7a1945

    • SHA512

      d151a7345f5e887a35699bf9da0f126dd8bef0cee5562e0df18eb976c9ae21ff6ca27edc59fab9ba939e668a7bc668d4c5550f1533cfce2ba13ee1775accf683

    • SSDEEP

      768:qGHV45EDE477AZbUJx0rZGE3jCELoiMMj6hZ3nE+EXVmkDbjRL8Khc15Z6J1S:qG14P477AxUYrZGoC09k0SkTRHhWqP

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks