General

  • Target

    ed3482be0c75c31ee4475f7bac019320_NeikiAnalytics.exe

  • Size

    450KB

  • Sample

    240517-seckbadc24

  • MD5

    ed3482be0c75c31ee4475f7bac019320

  • SHA1

    7c824852692f26e568f1d5bf6b37ace64ca6992e

  • SHA256

    c15c7ccd3f4a2b6f0f212bd3ea43887956187bfe1353d74d5476c4cef20c02c4

  • SHA512

    f15da5d6579ee4dc86d81f06bbec62edc19641a02606e3602ccf1eda6fb1bcc021c7397039941fed331ebfcf14fafb42b5819d2836fc39f89365435bd63ad88c

  • SSDEEP

    12288:NPKL+qcWf+n6a9WZrduKQCALArJkHW36Q:NSLDf+n6aQVduKQCRcW3Z

Malware Config

Targets

    • Target

      ed3482be0c75c31ee4475f7bac019320_NeikiAnalytics.exe

    • Size

      450KB

    • MD5

      ed3482be0c75c31ee4475f7bac019320

    • SHA1

      7c824852692f26e568f1d5bf6b37ace64ca6992e

    • SHA256

      c15c7ccd3f4a2b6f0f212bd3ea43887956187bfe1353d74d5476c4cef20c02c4

    • SHA512

      f15da5d6579ee4dc86d81f06bbec62edc19641a02606e3602ccf1eda6fb1bcc021c7397039941fed331ebfcf14fafb42b5819d2836fc39f89365435bd63ad88c

    • SSDEEP

      12288:NPKL+qcWf+n6a9WZrduKQCALArJkHW36Q:NSLDf+n6aQVduKQCRcW3Z

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks