General

  • Target

    697cd49a145913a2518e703133972d70_NeikiAnalytics.exe

  • Size

    1.3MB

  • Sample

    240523-bhkxesfh41

  • MD5

    697cd49a145913a2518e703133972d70

  • SHA1

    967e67e3f6ec8a7c843a22e49dd5416503a2d6b3

  • SHA256

    97fe2996f274c8c30cded5b4103e7c6077e5fef5d3a9bbbe266a843db8e0bfa8

  • SHA512

    8b1370955997228b44d5782fe940a9a3cc10eb666894c1e7ae17f9af21108edc02a5d8e659a733ec346a63f189c6fecbd3ea741d00f00246c51a8b826424cd18

  • SSDEEP

    24576:lq8xfsY0Z4U/EDtH2cWfrUKCKRmcZi/nCJf5cXilRdmI0jMA6suRaTmv6LSc5G73:JE2UO92rUTQmcynufh3hmMA6V/iLc7Oo

Malware Config

Targets

    • Target

      697cd49a145913a2518e703133972d70_NeikiAnalytics.exe

    • Size

      1.3MB

    • MD5

      697cd49a145913a2518e703133972d70

    • SHA1

      967e67e3f6ec8a7c843a22e49dd5416503a2d6b3

    • SHA256

      97fe2996f274c8c30cded5b4103e7c6077e5fef5d3a9bbbe266a843db8e0bfa8

    • SHA512

      8b1370955997228b44d5782fe940a9a3cc10eb666894c1e7ae17f9af21108edc02a5d8e659a733ec346a63f189c6fecbd3ea741d00f00246c51a8b826424cd18

    • SSDEEP

      24576:lq8xfsY0Z4U/EDtH2cWfrUKCKRmcZi/nCJf5cXilRdmI0jMA6suRaTmv6LSc5G73:JE2UO92rUTQmcynufh3hmMA6V/iLc7Oo

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks