General

  • Target

    c628c40bcf03f5f5896b827689323740_NeikiAnalytics

  • Size

    952KB

  • Sample

    240516-j54xtacb26

  • MD5

    c628c40bcf03f5f5896b827689323740

  • SHA1

    376f5e6ffb83f97e88af284c07ef008dd4fc570b

  • SHA256

    f2c8a9424d29027f1d060ba67f1788296bdda98413c0c98550a33621070f482a

  • SHA512

    2a16807da66ed16f2703a7b8831653c21259b344d46383fb14c5e98e2960b573da49a80f382ea90316c31f477942b6e9122e9b78ebbfda132eb6b7ee12dea21e

  • SSDEEP

    24576:0cNVFGzpcidaopGYduaW3Sy3esXyJrj+gk/wPVb64EzKD:HNVFRidP9uLCyusXyJrCgkYNGoD

Malware Config

Targets

    • Target

      c628c40bcf03f5f5896b827689323740_NeikiAnalytics

    • Size

      952KB

    • MD5

      c628c40bcf03f5f5896b827689323740

    • SHA1

      376f5e6ffb83f97e88af284c07ef008dd4fc570b

    • SHA256

      f2c8a9424d29027f1d060ba67f1788296bdda98413c0c98550a33621070f482a

    • SHA512

      2a16807da66ed16f2703a7b8831653c21259b344d46383fb14c5e98e2960b573da49a80f382ea90316c31f477942b6e9122e9b78ebbfda132eb6b7ee12dea21e

    • SSDEEP

      24576:0cNVFGzpcidaopGYduaW3Sy3esXyJrj+gk/wPVb64EzKD:HNVFRidP9uLCyusXyJrCgkYNGoD

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks