General

  • Target

    eaf7eca6472133c6fe64a427a988f160_NeikiAnalytics.exe

  • Size

    1.7MB

  • Sample

    240517-ntc26sga67

  • MD5

    eaf7eca6472133c6fe64a427a988f160

  • SHA1

    1d1834bd08e7ef280d98d010718ddd2e91d4598d

  • SHA256

    e352a918d309be3db7045ecdc5d878f7eac2d1bd35f454ab5ba9f3c4d2f13fb0

  • SHA512

    aa1ef1ac5faea2aa000b04e940d7cf3168c90dca2fb8592b3760cae2d13477ca4fe4ee36360ba6e4cd6c19aff1a21dafac6adb36365e3becf17a5bc8070f9331

  • SSDEEP

    49152:5vZ/VZDUsosw14GEf/7QWFPPZiDRVVxZL://VZDUq7QWhPZiDR3P

Malware Config

Targets

    • Target

      eaf7eca6472133c6fe64a427a988f160_NeikiAnalytics.exe

    • Size

      1.7MB

    • MD5

      eaf7eca6472133c6fe64a427a988f160

    • SHA1

      1d1834bd08e7ef280d98d010718ddd2e91d4598d

    • SHA256

      e352a918d309be3db7045ecdc5d878f7eac2d1bd35f454ab5ba9f3c4d2f13fb0

    • SHA512

      aa1ef1ac5faea2aa000b04e940d7cf3168c90dca2fb8592b3760cae2d13477ca4fe4ee36360ba6e4cd6c19aff1a21dafac6adb36365e3becf17a5bc8070f9331

    • SSDEEP

      49152:5vZ/VZDUsosw14GEf/7QWFPPZiDRVVxZL://VZDUq7QWhPZiDR3P

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks