General

  • Target

    ceae757bc36d0fbe30076801b527f340_NeikiAnalytics.exe

  • Size

    794KB

  • Sample

    240523-y39gvafa45

  • MD5

    ceae757bc36d0fbe30076801b527f340

  • SHA1

    6c9f1ee6dc789e08c4cbef37897b64a5a98f65ac

  • SHA256

    ce795859042f6d9a5925c34442341e310475dc3b7776319e4fe48186ec7938a5

  • SHA512

    9765a2074f41809c94d5e01b5e759bec3c20c63458368e3a74156015e7e97eef44533999609539b1edce5190dc711be331378f243fe459efba9579cf867cb6dc

  • SSDEEP

    24576:KNKTs+7tXdmUjt2pHPkHQTlA68Sme0127+Fn:Wi19dmOtIPkw5Z8Xp3

Malware Config

Targets

    • Target

      ceae757bc36d0fbe30076801b527f340_NeikiAnalytics.exe

    • Size

      794KB

    • MD5

      ceae757bc36d0fbe30076801b527f340

    • SHA1

      6c9f1ee6dc789e08c4cbef37897b64a5a98f65ac

    • SHA256

      ce795859042f6d9a5925c34442341e310475dc3b7776319e4fe48186ec7938a5

    • SHA512

      9765a2074f41809c94d5e01b5e759bec3c20c63458368e3a74156015e7e97eef44533999609539b1edce5190dc711be331378f243fe459efba9579cf867cb6dc

    • SSDEEP

      24576:KNKTs+7tXdmUjt2pHPkHQTlA68Sme0127+Fn:Wi19dmOtIPkw5Z8Xp3

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (61) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks