General

  • Target

    5c8bbe5273a8078f1c0af12a62f66a60_NeikiAnalytics.exe

  • Size

    240KB

  • Sample

    240522-3yavyadg9t

  • MD5

    5c8bbe5273a8078f1c0af12a62f66a60

  • SHA1

    76ee87f5312914c0165f533c0e87b0c8765d3c00

  • SHA256

    72cc50ebb938498bb58db63326a25188be0a75f8db45c15783aa68520f71fefb

  • SHA512

    b6ab274312428a4896badb0e6a76cbd1c9b54b3b4d73c2dce0fb8d138bf207e4c07a745cf5234696d7be16fadf5a3a7bc411e95e7b5963a8a5a6384d54f28478

  • SSDEEP

    1536:Bq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9bB:Bq5ud9qHFO8Kf3rIIbB

Malware Config

Targets

    • Target

      5c8bbe5273a8078f1c0af12a62f66a60_NeikiAnalytics.exe

    • Size

      240KB

    • MD5

      5c8bbe5273a8078f1c0af12a62f66a60

    • SHA1

      76ee87f5312914c0165f533c0e87b0c8765d3c00

    • SHA256

      72cc50ebb938498bb58db63326a25188be0a75f8db45c15783aa68520f71fefb

    • SHA512

      b6ab274312428a4896badb0e6a76cbd1c9b54b3b4d73c2dce0fb8d138bf207e4c07a745cf5234696d7be16fadf5a3a7bc411e95e7b5963a8a5a6384d54f28478

    • SSDEEP

      1536:Bq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9bB:Bq5ud9qHFO8Kf3rIIbB

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks