General

  • Target

    cdc66d88d7bd0bad4c50ea3a73755dc0_NeikiAnalytics.exe

  • Size

    75KB

  • Sample

    240520-hzn4qshf8z

  • MD5

    cdc66d88d7bd0bad4c50ea3a73755dc0

  • SHA1

    60c2a76c9d1c4131b852f5782e28ba48f34c148d

  • SHA256

    87131ab55700b3f582ea907ccbfd8caf096d052abdb4e4cf587e016bc84feaa7

  • SHA512

    a35b997d686f7910dbe5fe3081f98f6cf9f00194827a1b478858669896fc4e742c3f6e3c1248b8ca06fb98a1cddfd6368b3097e51cf93debf05d89acab83f75a

  • SSDEEP

    1536:Rx1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3v:rOjWuyt0ZsqsXOKofHfHTXQLzgvnzHP3

Malware Config

Targets

    • Target

      cdc66d88d7bd0bad4c50ea3a73755dc0_NeikiAnalytics.exe

    • Size

      75KB

    • MD5

      cdc66d88d7bd0bad4c50ea3a73755dc0

    • SHA1

      60c2a76c9d1c4131b852f5782e28ba48f34c148d

    • SHA256

      87131ab55700b3f582ea907ccbfd8caf096d052abdb4e4cf587e016bc84feaa7

    • SHA512

      a35b997d686f7910dbe5fe3081f98f6cf9f00194827a1b478858669896fc4e742c3f6e3c1248b8ca06fb98a1cddfd6368b3097e51cf93debf05d89acab83f75a

    • SSDEEP

      1536:Rx1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3v:rOjWuyt0ZsqsXOKofHfHTXQLzgvnzHP3

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks