General

  • Target

    43e4acc8fecfbd707d10ff3ff850a620_NeikiAnalytics.exe

  • Size

    493KB

  • Sample

    240522-1m5j3ahh9y

  • MD5

    43e4acc8fecfbd707d10ff3ff850a620

  • SHA1

    90d59831ea55738d590fbfae6e4796b788d08750

  • SHA256

    958b3510249e6c95d49c0b38fcbcd4a2c0e8de5ef161527c2d0edea180b65828

  • SHA512

    ea39083521dce8f4a1addc815a20361fbcf7dc30ca614d60482b75efaa49fe51c2dcab5338c4f9c384f5bcd080fff42a400ee38de100fa801a1a2e6d295779b9

  • SSDEEP

    6144:mgqTklvCAWPzbhzQCpfmBD7qYIeUpl5u3fvLmisf8XHUohSE/MPEP/15GE737xA:mPcqAWbbaCYD7Ez3GfKsEof/Na

Malware Config

Targets

    • Target

      43e4acc8fecfbd707d10ff3ff850a620_NeikiAnalytics.exe

    • Size

      493KB

    • MD5

      43e4acc8fecfbd707d10ff3ff850a620

    • SHA1

      90d59831ea55738d590fbfae6e4796b788d08750

    • SHA256

      958b3510249e6c95d49c0b38fcbcd4a2c0e8de5ef161527c2d0edea180b65828

    • SHA512

      ea39083521dce8f4a1addc815a20361fbcf7dc30ca614d60482b75efaa49fe51c2dcab5338c4f9c384f5bcd080fff42a400ee38de100fa801a1a2e6d295779b9

    • SSDEEP

      6144:mgqTklvCAWPzbhzQCpfmBD7qYIeUpl5u3fvLmisf8XHUohSE/MPEP/15GE737xA:mPcqAWbbaCYD7Ez3GfKsEof/Na

    • UAC bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Scheduled Task/Job

1
T1053

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks