General

  • Target

    0f2f7c203f568b0203432f0afc19fe70_NeikiAnalytics

  • Size

    41KB

  • Sample

    240515-ws5pssch6t

  • MD5

    0f2f7c203f568b0203432f0afc19fe70

  • SHA1

    25d176c6f70444c182854eebc2c0c54d6d695711

  • SHA256

    7052bdf9222722e6c74db15c579ba28251f33645db0c8b109c43f29656fa1385

  • SHA512

    5ac0bf525c0d0e0e0eaafe0129597e38ebacb0c5db5cdc0fa74cf12f2e1d77f1fa4cac99de1e970ff81610fa38de0ae27735bcd06b634b75f16b84d422cbb0bd

  • SSDEEP

    768:CeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09CyH:Cq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSD

Malware Config

Targets

    • Target

      0f2f7c203f568b0203432f0afc19fe70_NeikiAnalytics

    • Size

      41KB

    • MD5

      0f2f7c203f568b0203432f0afc19fe70

    • SHA1

      25d176c6f70444c182854eebc2c0c54d6d695711

    • SHA256

      7052bdf9222722e6c74db15c579ba28251f33645db0c8b109c43f29656fa1385

    • SHA512

      5ac0bf525c0d0e0e0eaafe0129597e38ebacb0c5db5cdc0fa74cf12f2e1d77f1fa4cac99de1e970ff81610fa38de0ae27735bcd06b634b75f16b84d422cbb0bd

    • SSDEEP

      768:CeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09CyH:Cq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSD

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks