General

  • Target

    7f77caa51289732f7b8ec560c2594840_NeikiAnalytics

  • Size

    66KB

  • Sample

    240516-cwgbtsgc8s

  • MD5

    7f77caa51289732f7b8ec560c2594840

  • SHA1

    ca890d032d788dff302e05ae62586ad2c29e82c6

  • SHA256

    9c2e18fb2bed8d1a3a77f7ae911f6e2c671935884d22c3ec2870e116440c4299

  • SHA512

    12ab03682049eb3127dea149f2bb3a25126b3bd1e1c347a3b646f902a7ff59e94d72b2129d3a729e59575d9a8e5834c0e0b36913f0d82f730f641b8d0c8a6103

  • SSDEEP

    768:/WPcTO5RroZJ76739sBWsNscWlM3dN9N3ZjfPP02KG6KzVSVxhMXYkUEt6HAkx5r:/iSe+Zk78NR3dN5nP02kKzs2Irj5hN

Score
7/10

Malware Config

Targets

    • Target

      7f77caa51289732f7b8ec560c2594840_NeikiAnalytics

    • Size

      66KB

    • MD5

      7f77caa51289732f7b8ec560c2594840

    • SHA1

      ca890d032d788dff302e05ae62586ad2c29e82c6

    • SHA256

      9c2e18fb2bed8d1a3a77f7ae911f6e2c671935884d22c3ec2870e116440c4299

    • SHA512

      12ab03682049eb3127dea149f2bb3a25126b3bd1e1c347a3b646f902a7ff59e94d72b2129d3a729e59575d9a8e5834c0e0b36913f0d82f730f641b8d0c8a6103

    • SSDEEP

      768:/WPcTO5RroZJ76739sBWsNscWlM3dN9N3ZjfPP02KG6KzVSVxhMXYkUEt6HAkx5r:/iSe+Zk78NR3dN5nP02kKzs2Irj5hN

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks