General

  • Target

    dfe52095b3afd14ac838740878c2a720_NeikiAnalytics

  • Size

    581KB

  • Sample

    240516-qcz7gseb21

  • MD5

    dfe52095b3afd14ac838740878c2a720

  • SHA1

    3373984950856b0528f7fbfe0c812aeac8fb8d33

  • SHA256

    d70ad56b697e834174c47e81d33eba70c463c25e7168c7ff4f29a0854e1c4118

  • SHA512

    22b90f7817b0cd7d0bab1d5e60cc393ea0199febec073c94a6cd13ea285093e42defe0fc23795be7ab5d6f49b6b2ecea544aacd7d973059d8d1b7202566fe514

  • SSDEEP

    12288:VEQoSfqEwNMdzO9AH2E5M4EsHQIYtoWgRW4VrM:V3ww/r5usHQ/VB

Malware Config

Targets

    • Target

      dfe52095b3afd14ac838740878c2a720_NeikiAnalytics

    • Size

      581KB

    • MD5

      dfe52095b3afd14ac838740878c2a720

    • SHA1

      3373984950856b0528f7fbfe0c812aeac8fb8d33

    • SHA256

      d70ad56b697e834174c47e81d33eba70c463c25e7168c7ff4f29a0854e1c4118

    • SHA512

      22b90f7817b0cd7d0bab1d5e60cc393ea0199febec073c94a6cd13ea285093e42defe0fc23795be7ab5d6f49b6b2ecea544aacd7d973059d8d1b7202566fe514

    • SSDEEP

      12288:VEQoSfqEwNMdzO9AH2E5M4EsHQIYtoWgRW4VrM:V3ww/r5usHQ/VB

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks