General

  • Target

    dc9ae4caebac6c3dc502855fdbc0adb0_NeikiAnalytics

  • Size

    750KB

  • Sample

    240516-nkgc8sac2s

  • MD5

    dc9ae4caebac6c3dc502855fdbc0adb0

  • SHA1

    d84bfa6e801bffe9f4e6b3c0e92d48a811a8efd5

  • SHA256

    07148fa6505c839d1093fef41b0a4a0ed3597bb0e9daffaca31eb558945dcb00

  • SHA512

    f1a53214c6ab277f3a5a5a641358c4fcebfc5bd92f4042099dc617452405c25610238121c55d7079826d95a4c782b681df77851181a9648bcb1eff88d49ba15d

  • SSDEEP

    12288:A8EQoSM0hjbPek6QndW/6OV1tv2tYGxu1g4DFk/YNsAP9AjChROwWLF+e8sqpnw8:A8T6GM/11teGGxWZFkGS+hIwWLBKpw8H

Malware Config

Targets

    • Target

      dc9ae4caebac6c3dc502855fdbc0adb0_NeikiAnalytics

    • Size

      750KB

    • MD5

      dc9ae4caebac6c3dc502855fdbc0adb0

    • SHA1

      d84bfa6e801bffe9f4e6b3c0e92d48a811a8efd5

    • SHA256

      07148fa6505c839d1093fef41b0a4a0ed3597bb0e9daffaca31eb558945dcb00

    • SHA512

      f1a53214c6ab277f3a5a5a641358c4fcebfc5bd92f4042099dc617452405c25610238121c55d7079826d95a4c782b681df77851181a9648bcb1eff88d49ba15d

    • SSDEEP

      12288:A8EQoSM0hjbPek6QndW/6OV1tv2tYGxu1g4DFk/YNsAP9AjChROwWLF+e8sqpnw8:A8T6GM/11teGGxWZFkGS+hIwWLBKpw8H

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks