General

  • Target

    5451b407a30536a6d769a3d83dfced70_NeikiAnalytics.exe

  • Size

    36KB

  • Sample

    240516-28qtgadf6t

  • MD5

    5451b407a30536a6d769a3d83dfced70

  • SHA1

    a8218c202b44d194d49a85f77bc862cb2265dad9

  • SHA256

    c102febf94bc3b410d345187014e317229c6f594eccaf9f09fc804a618fd9cdb

  • SHA512

    f36ef31cf9dba39ee7cd1095e51fbe992b023554d9822b69b14b3960e226c08d0bc6f180323ca9c5a6571845fd23dec97dfc715b3e6514d1aec49ebebf8c452e

  • SSDEEP

    768:A3fLgvaEGU4aikqykezg2XpfY/jYioRofeq2l5:gLb1Dezg2ZfY2om95

Score
7/10

Malware Config

Targets

    • Target

      5451b407a30536a6d769a3d83dfced70_NeikiAnalytics.exe

    • Size

      36KB

    • MD5

      5451b407a30536a6d769a3d83dfced70

    • SHA1

      a8218c202b44d194d49a85f77bc862cb2265dad9

    • SHA256

      c102febf94bc3b410d345187014e317229c6f594eccaf9f09fc804a618fd9cdb

    • SHA512

      f36ef31cf9dba39ee7cd1095e51fbe992b023554d9822b69b14b3960e226c08d0bc6f180323ca9c5a6571845fd23dec97dfc715b3e6514d1aec49ebebf8c452e

    • SSDEEP

      768:A3fLgvaEGU4aikqykezg2XpfY/jYioRofeq2l5:gLb1Dezg2ZfY2om95

    Score
    7/10
    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks