General

  • Target

    37dccee227d014bea3538d2dddf80288684a28387e09e8338cb7a95fd9c39dbf_NeikiAnalytics

  • Size

    391KB

  • Sample

    240521-mpql2aad69

  • MD5

    46486b51f92c95f77d70e6fad7663c20

  • SHA1

    bb2b2e90a4d65eda67adb13367f0a31b4eeea2c0

  • SHA256

    37dccee227d014bea3538d2dddf80288684a28387e09e8338cb7a95fd9c39dbf

  • SHA512

    089a0ebb64a6ad93665fd7d8cecb4a4fd879331d8fd79eefd232e9ce0cfc92bca7bbade9d756ea7f74c6760e32e7927e6f5f2c550fa49221ab076c0fae88b579

  • SSDEEP

    6144:YjluQoStIo5R4nM/40yJkaSyBWF4U1cyU4WzkrFUfiB1rmOfhlY9yjpJGOgZXPTQ:YEQoSnqhkEM71XmkrF/1VDDf0Vr1pY

Malware Config

Targets

    • Target

      37dccee227d014bea3538d2dddf80288684a28387e09e8338cb7a95fd9c39dbf_NeikiAnalytics

    • Size

      391KB

    • MD5

      46486b51f92c95f77d70e6fad7663c20

    • SHA1

      bb2b2e90a4d65eda67adb13367f0a31b4eeea2c0

    • SHA256

      37dccee227d014bea3538d2dddf80288684a28387e09e8338cb7a95fd9c39dbf

    • SHA512

      089a0ebb64a6ad93665fd7d8cecb4a4fd879331d8fd79eefd232e9ce0cfc92bca7bbade9d756ea7f74c6760e32e7927e6f5f2c550fa49221ab076c0fae88b579

    • SSDEEP

      6144:YjluQoStIo5R4nM/40yJkaSyBWF4U1cyU4WzkrFUfiB1rmOfhlY9yjpJGOgZXPTQ:YEQoSnqhkEM71XmkrF/1VDDf0Vr1pY

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks