General

  • Target

    e5889e98decd7cc9b639fc63c0763710_NeikiAnalytics

  • Size

    190KB

  • Sample

    240516-t9tmradg9x

  • MD5

    e5889e98decd7cc9b639fc63c0763710

  • SHA1

    6ddb6d41f9feb85fc565cb4181df37b77972ade9

  • SHA256

    f9d7531ae1f981be8f829bf52052f11861ffcdb4fe051e3f40f76ac1613f34c4

  • SHA512

    0d5f216504415b655f689e87718c8a40f4fb846f63d6856fa754b86d405d63c0c65677869b64ea6a65459a72e7741a4b61715fae558763443ad297bc7e651618

  • SSDEEP

    3072:BZ6P+DaVjbO4rPA20cSkfJv7USyS1Il6hKUh2gm8KYLja2snTuBE:BZ6P+GHAgSStKUhQxYSLnTuBE

Malware Config

Targets

    • Target

      e5889e98decd7cc9b639fc63c0763710_NeikiAnalytics

    • Size

      190KB

    • MD5

      e5889e98decd7cc9b639fc63c0763710

    • SHA1

      6ddb6d41f9feb85fc565cb4181df37b77972ade9

    • SHA256

      f9d7531ae1f981be8f829bf52052f11861ffcdb4fe051e3f40f76ac1613f34c4

    • SHA512

      0d5f216504415b655f689e87718c8a40f4fb846f63d6856fa754b86d405d63c0c65677869b64ea6a65459a72e7741a4b61715fae558763443ad297bc7e651618

    • SSDEEP

      3072:BZ6P+DaVjbO4rPA20cSkfJv7USyS1Il6hKUh2gm8KYLja2snTuBE:BZ6P+GHAgSStKUhQxYSLnTuBE

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (80) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks