General

  • Target

    09e4dc3a31aff7d433014a24e6dc14b0_NeikiAnalytics.exe

  • Size

    154KB

  • Sample

    240516-wsylgshc2w

  • MD5

    09e4dc3a31aff7d433014a24e6dc14b0

  • SHA1

    34df6ea991ea75f873d0a4bd9949f725173ed60f

  • SHA256

    d9eba8b6957b0b9f58e0be16db86cc6b9d3b525c095c682fc6db8f7a65654291

  • SHA512

    8b4cb42e96859b08b678f9ae0df6f84cd95ddfc8091443eb791e670cc117a269e8533c3113ddbe4e4cf793ce292b6429dea158f2fbfb45442abcd88f8055b028

  • SSDEEP

    3072:kjr87SHQRMQDaTcbVVZJyRDOHRr3fx/N7p:5vO4ckV

Malware Config

Targets

    • Target

      09e4dc3a31aff7d433014a24e6dc14b0_NeikiAnalytics.exe

    • Size

      154KB

    • MD5

      09e4dc3a31aff7d433014a24e6dc14b0

    • SHA1

      34df6ea991ea75f873d0a4bd9949f725173ed60f

    • SHA256

      d9eba8b6957b0b9f58e0be16db86cc6b9d3b525c095c682fc6db8f7a65654291

    • SHA512

      8b4cb42e96859b08b678f9ae0df6f84cd95ddfc8091443eb791e670cc117a269e8533c3113ddbe4e4cf793ce292b6429dea158f2fbfb45442abcd88f8055b028

    • SSDEEP

      3072:kjr87SHQRMQDaTcbVVZJyRDOHRr3fx/N7p:5vO4ckV

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks