General

  • Target

    e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe

  • Size

    211KB

  • Sample

    240523-ed59cach6s

  • MD5

    e001ecbe13347dc35e2de3089f6144f0

  • SHA1

    ff99a479cee1d76005f9e9af1011818897b31a78

  • SHA256

    eb30e6e1159ac49a11426997c6354c2b73be0d177b56f523cfb1e8c93fc1c342

  • SHA512

    7720b9dd66fc7600924a59cf5b9444f87baadf864f1c832061dc9422ca6e3ff10428f2acda904e367a23dedb0210d751311f02c319790e95694baa11c7d351f7

  • SSDEEP

    3072:JTDETepBR25NaWUtdBuqE4grFYszWU6Uvn65ZkmxLZklBIZH:JRU5NaWUb8qE4yF9JPy5qmbklOZH

Malware Config

Targets

    • Target

      e001ecbe13347dc35e2de3089f6144f0_NeikiAnalytics.exe

    • Size

      211KB

    • MD5

      e001ecbe13347dc35e2de3089f6144f0

    • SHA1

      ff99a479cee1d76005f9e9af1011818897b31a78

    • SHA256

      eb30e6e1159ac49a11426997c6354c2b73be0d177b56f523cfb1e8c93fc1c342

    • SHA512

      7720b9dd66fc7600924a59cf5b9444f87baadf864f1c832061dc9422ca6e3ff10428f2acda904e367a23dedb0210d751311f02c319790e95694baa11c7d351f7

    • SSDEEP

      3072:JTDETepBR25NaWUtdBuqE4grFYszWU6Uvn65ZkmxLZklBIZH:JRU5NaWUb8qE4yF9JPy5qmbklOZH

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (74) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks