General

  • Target

    8bbcf36d1f2b4eca7c70af8b6443a6e0_NeikiAnalytics

  • Size

    384KB

  • Sample

    240515-gajx2sbg74

  • MD5

    8bbcf36d1f2b4eca7c70af8b6443a6e0

  • SHA1

    2595746ec6c95fbe1f463dc8d6229900fa7e0423

  • SHA256

    d1140c35e5b478e95c878008eed37c4f6b4eb25fd5b068f010352417abb71f07

  • SHA512

    81bc129e2b8e00529209936a0ef4fdddb22dde922269a7881b0897f1ffe0cf8851e206bef1ef9feda644a2dd4d36a54a354c04510d34ddc5d9b1650382b9dbf2

  • SSDEEP

    6144:/rTfUHeeSKOS9ccFKk3Y9t9YZjuiYz1MpA5nB:/n8yN0Mr8ZjtI1z5nB

Malware Config

Targets

    • Target

      8bbcf36d1f2b4eca7c70af8b6443a6e0_NeikiAnalytics

    • Size

      384KB

    • MD5

      8bbcf36d1f2b4eca7c70af8b6443a6e0

    • SHA1

      2595746ec6c95fbe1f463dc8d6229900fa7e0423

    • SHA256

      d1140c35e5b478e95c878008eed37c4f6b4eb25fd5b068f010352417abb71f07

    • SHA512

      81bc129e2b8e00529209936a0ef4fdddb22dde922269a7881b0897f1ffe0cf8851e206bef1ef9feda644a2dd4d36a54a354c04510d34ddc5d9b1650382b9dbf2

    • SSDEEP

      6144:/rTfUHeeSKOS9ccFKk3Y9t9YZjuiYz1MpA5nB:/n8yN0Mr8ZjtI1z5nB

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks