General

  • Target

    9d21cd734cdbf84c662496350c1b1890_NeikiAnalytics.exe

  • Size

    452KB

  • Sample

    240518-glb2ksee7y

  • MD5

    9d21cd734cdbf84c662496350c1b1890

  • SHA1

    c2e8f86c6d9a0bb339138e8d66b9713cbfe64969

  • SHA256

    707a58c93f8e354a598b591e9b83ca19f3b8c59ccf41cadf8f284829d29dc4e2

  • SHA512

    dee9e018de085414ea32184a0dbbf9b78985b47815e4f9be8638bbb8d57866f6a617fccfc83b1c46ea969dc96c2c0ee4dbdfa19ada45d3c535a05c23fb77ccad

  • SSDEEP

    6144:k9j+5p1H4liuxZWRfqYIr55C7C1BZCGA1rdsUKRHZQ/xzo9A+0iSkhKwSCvVrJLN:N57UYgyg77R5cz8IiSYSyr

Malware Config

Targets

    • Target

      9d21cd734cdbf84c662496350c1b1890_NeikiAnalytics.exe

    • Size

      452KB

    • MD5

      9d21cd734cdbf84c662496350c1b1890

    • SHA1

      c2e8f86c6d9a0bb339138e8d66b9713cbfe64969

    • SHA256

      707a58c93f8e354a598b591e9b83ca19f3b8c59ccf41cadf8f284829d29dc4e2

    • SHA512

      dee9e018de085414ea32184a0dbbf9b78985b47815e4f9be8638bbb8d57866f6a617fccfc83b1c46ea969dc96c2c0ee4dbdfa19ada45d3c535a05c23fb77ccad

    • SSDEEP

      6144:k9j+5p1H4liuxZWRfqYIr55C7C1BZCGA1rdsUKRHZQ/xzo9A+0iSkhKwSCvVrJLN:N57UYgyg77R5cz8IiSYSyr

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks