General

  • Target

    9f94ac2bb5564d72a3e1a69078ea2a30_NeikiAnalytics.exe

  • Size

    1.6MB

  • Sample

    240518-gtga9seh9t

  • MD5

    9f94ac2bb5564d72a3e1a69078ea2a30

  • SHA1

    e0dac861fd41ff26b8cf7a4b2ff6873dd0aa1581

  • SHA256

    66e09ac60e0c0c5f685796cdf3ea24605ca2eda2d654fd9c48c387ad666b2619

  • SHA512

    8efa96d155b639152a92cfb6d684070508cced91ceb81728131985d78b28bd1e2d961bc6f19743f260c465b750280e38670b4e4fe6d773680c883970cdb7863b

  • SSDEEP

    24576:vE3UVzuuVSTy9g1tLD/nDtBHD8R5u6gfGKpdA7MY:cNDLtB8RFgfGUcMY

Malware Config

Targets

    • Target

      9f94ac2bb5564d72a3e1a69078ea2a30_NeikiAnalytics.exe

    • Size

      1.6MB

    • MD5

      9f94ac2bb5564d72a3e1a69078ea2a30

    • SHA1

      e0dac861fd41ff26b8cf7a4b2ff6873dd0aa1581

    • SHA256

      66e09ac60e0c0c5f685796cdf3ea24605ca2eda2d654fd9c48c387ad666b2619

    • SHA512

      8efa96d155b639152a92cfb6d684070508cced91ceb81728131985d78b28bd1e2d961bc6f19743f260c465b750280e38670b4e4fe6d773680c883970cdb7863b

    • SSDEEP

      24576:vE3UVzuuVSTy9g1tLD/nDtBHD8R5u6gfGKpdA7MY:cNDLtB8RFgfGUcMY

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks