General

  • Target

    190b5a0303af0632e993518648360160_NeikiAnalytics.exe

  • Size

    1.3MB

  • Sample

    240523-hhf2ssgf5y

  • MD5

    190b5a0303af0632e993518648360160

  • SHA1

    8fad4cce24a0c6cc69cdbea9931441df2ea3d764

  • SHA256

    c608dc18f2b1f67001813814e7dc932b1541992b10460dbd5cf3b63678adab3e

  • SHA512

    5aa64044f8f2c7b74f23016c8206502471ba7ace4f014f5954d179e0f5216b28f0cd096fdea0bf8a0abf3fa28f870ee3101efebd3809573f40b26b13d2d071a7

  • SSDEEP

    24576:Qak/7Nk4RZBz2KZu0zoFmDcpii9iGn+66rLfJIgtEqPILWz8oDqE:Qak/rPZu+k0WdEacJRIo+E

Malware Config

Targets

    • Target

      190b5a0303af0632e993518648360160_NeikiAnalytics.exe

    • Size

      1.3MB

    • MD5

      190b5a0303af0632e993518648360160

    • SHA1

      8fad4cce24a0c6cc69cdbea9931441df2ea3d764

    • SHA256

      c608dc18f2b1f67001813814e7dc932b1541992b10460dbd5cf3b63678adab3e

    • SHA512

      5aa64044f8f2c7b74f23016c8206502471ba7ace4f014f5954d179e0f5216b28f0cd096fdea0bf8a0abf3fa28f870ee3101efebd3809573f40b26b13d2d071a7

    • SSDEEP

      24576:Qak/7Nk4RZBz2KZu0zoFmDcpii9iGn+66rLfJIgtEqPILWz8oDqE:Qak/rPZu+k0WdEacJRIo+E

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks