General

  • Target

    933c2f83027822fa393730675bb57710_NeikiAnalytics.exe

  • Size

    2.0MB

  • Sample

    240522-yssrcaee5s

  • MD5

    933c2f83027822fa393730675bb57710

  • SHA1

    bc2af8503aa395569b34daa0ed241c3141866fdb

  • SHA256

    b5bb0722c59a5dc74204c55bc8eeb1a3b70bd6422a6e44485770c0cb159d8d8f

  • SHA512

    af22f6ee61b94ff895b202787a90f387792ed3bc5092a26d0ae23a4ef4bf0ab91de377498a46860986a46729c1c165ca764185f8a5e85b6e7cb534d0188c63d8

  • SSDEEP

    49152:IFno/jf4JtTF+TxMoxc1TU+j+dAzGkiT:IFno/jwtIuoITsdZT

Malware Config

Extracted

Family

stealc

rc4.plain

Targets

    • Target

      933c2f83027822fa393730675bb57710_NeikiAnalytics.exe

    • Size

      2.0MB

    • MD5

      933c2f83027822fa393730675bb57710

    • SHA1

      bc2af8503aa395569b34daa0ed241c3141866fdb

    • SHA256

      b5bb0722c59a5dc74204c55bc8eeb1a3b70bd6422a6e44485770c0cb159d8d8f

    • SHA512

      af22f6ee61b94ff895b202787a90f387792ed3bc5092a26d0ae23a4ef4bf0ab91de377498a46860986a46729c1c165ca764185f8a5e85b6e7cb534d0188c63d8

    • SSDEEP

      49152:IFno/jf4JtTF+TxMoxc1TU+j+dAzGkiT:IFno/jwtIuoITsdZT

    • Detect Vidar Stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks