General

  • Target

    e44b1689de5bcebb55715b2af2153690_NeikiAnalytics

  • Size

    1.4MB

  • Sample

    240516-tjpacacg28

  • MD5

    e44b1689de5bcebb55715b2af2153690

  • SHA1

    f5812ebd23004dd26a3959076773d55cf6371e7a

  • SHA256

    1c70e0a71d28933c0ed3eea9aab98f4c2473ff80cc324c4b64a97610905da681

  • SHA512

    5811a1e87f5c220d1829e42e27f969f0197fe6aad862236fa499a8181c668b3c2ed38ebdcc77d983d91d168357ce83d0e27bf21ce0048991616163cb7ea98c09

  • SSDEEP

    24576:lUEe12uzQQpamWQAVKTi2u5XEobXUKlwYdBOyfBt6jZvMgmYL5bDwfjt1ifaVC7A:+D2WKVKGxEKlwYdBOyfzGZUgpd/wfDiK

Malware Config

Targets

    • Target

      e44b1689de5bcebb55715b2af2153690_NeikiAnalytics

    • Size

      1.4MB

    • MD5

      e44b1689de5bcebb55715b2af2153690

    • SHA1

      f5812ebd23004dd26a3959076773d55cf6371e7a

    • SHA256

      1c70e0a71d28933c0ed3eea9aab98f4c2473ff80cc324c4b64a97610905da681

    • SHA512

      5811a1e87f5c220d1829e42e27f969f0197fe6aad862236fa499a8181c668b3c2ed38ebdcc77d983d91d168357ce83d0e27bf21ce0048991616163cb7ea98c09

    • SSDEEP

      24576:lUEe12uzQQpamWQAVKTi2u5XEobXUKlwYdBOyfBt6jZvMgmYL5bDwfjt1ifaVC7A:+D2WKVKGxEKlwYdBOyfzGZUgpd/wfDiK

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks