General

  • Target

    21c60ea553c75baf4fa91b967c2ce120_NeikiAnalytics.exe

  • Size

    119KB

  • Sample

    240517-x91ylsfb2y

  • MD5

    21c60ea553c75baf4fa91b967c2ce120

  • SHA1

    e0ecece4e25ec0697bad3741313095589c941c36

  • SHA256

    9f4d207573abbfe726fc00f7eda854a319a475b9a19b08971161ebb79c63139e

  • SHA512

    b97a82d5b08185d07c49b9a8ee4c8768e0a24ec33a0f90b867c05318bc3fc42adcea3ca608a034ee95f468b93e0cc853b1ea5a0ae9ae78bea2f2d3c477f32b7d

  • SSDEEP

    3072:5OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:5Is9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Targets

    • Target

      21c60ea553c75baf4fa91b967c2ce120_NeikiAnalytics.exe

    • Size

      119KB

    • MD5

      21c60ea553c75baf4fa91b967c2ce120

    • SHA1

      e0ecece4e25ec0697bad3741313095589c941c36

    • SHA256

      9f4d207573abbfe726fc00f7eda854a319a475b9a19b08971161ebb79c63139e

    • SHA512

      b97a82d5b08185d07c49b9a8ee4c8768e0a24ec33a0f90b867c05318bc3fc42adcea3ca608a034ee95f468b93e0cc853b1ea5a0ae9ae78bea2f2d3c477f32b7d

    • SSDEEP

      3072:5OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:5Is9OKofHfHTXQLzgvnzHPowYbvrjD/E

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks