General

  • Target

    2ca488af66f3da32a91d8aab4aead350_NeikiAnalytics.exe

  • Size

    52KB

  • Sample

    240522-ytc3aaee6z

  • MD5

    2ca488af66f3da32a91d8aab4aead350

  • SHA1

    c5c71d0b9f5a18d6b4d8daaebf0345fcbafef058

  • SHA256

    655b7fcffc559d5ae6385e8b33362e41d13e540aa03b359671efc83a1380817a

  • SHA512

    7e48e08be9d22e323b31cdc9e0384152eb6553b4fe0e66cfdabcdbc24e802174696f47b0cdae69a792f3eb843529075b65829ee21795190071d12aaf87325bbb

  • SSDEEP

    1536:N5VzcfA/6LrVpL74gfh16nGTYNvOaP1S+NCS:/V2A/gVh74gpgCo0oCS

Malware Config

Targets

    • Target

      2ca488af66f3da32a91d8aab4aead350_NeikiAnalytics.exe

    • Size

      52KB

    • MD5

      2ca488af66f3da32a91d8aab4aead350

    • SHA1

      c5c71d0b9f5a18d6b4d8daaebf0345fcbafef058

    • SHA256

      655b7fcffc559d5ae6385e8b33362e41d13e540aa03b359671efc83a1380817a

    • SHA512

      7e48e08be9d22e323b31cdc9e0384152eb6553b4fe0e66cfdabcdbc24e802174696f47b0cdae69a792f3eb843529075b65829ee21795190071d12aaf87325bbb

    • SSDEEP

      1536:N5VzcfA/6LrVpL74gfh16nGTYNvOaP1S+NCS:/V2A/gVh74gpgCo0oCS

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks