General

  • Target

    dc3ace631f9e573bbda89093e4a51a80_NeikiAnalytics

  • Size

    1.4MB

  • Sample

    240516-ncxegshg9y

  • MD5

    dc3ace631f9e573bbda89093e4a51a80

  • SHA1

    0a33950ee256798f669d85ad6339cf6910468ec7

  • SHA256

    e332a022ce1f3735736a2f6ce24753864a5d00e325baaae49e559bcd181a22af

  • SHA512

    d81219394662fb885b3b74ce33772244e3c414e59b5d327b472b793546d41b09c4d2017bab4a6620ca23730d026dc8cef60bad99508323f0b10f8295e40b08c5

  • SSDEEP

    24576:VHNkfxw+uozuaQRkHH3w7q9z2ZcAoauA5wZoTDmLoObuZdLSYZ/WRC0:Z2C+uk/8K3wcQ/V5GoTi3buj/WRC0

Malware Config

Targets

    • Target

      dc3ace631f9e573bbda89093e4a51a80_NeikiAnalytics

    • Size

      1.4MB

    • MD5

      dc3ace631f9e573bbda89093e4a51a80

    • SHA1

      0a33950ee256798f669d85ad6339cf6910468ec7

    • SHA256

      e332a022ce1f3735736a2f6ce24753864a5d00e325baaae49e559bcd181a22af

    • SHA512

      d81219394662fb885b3b74ce33772244e3c414e59b5d327b472b793546d41b09c4d2017bab4a6620ca23730d026dc8cef60bad99508323f0b10f8295e40b08c5

    • SSDEEP

      24576:VHNkfxw+uozuaQRkHH3w7q9z2ZcAoauA5wZoTDmLoObuZdLSYZ/WRC0:Z2C+uk/8K3wcQ/V5GoTi3buj/WRC0

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks