General

  • Target

    da3608d3303bc261b9d2ab6c4feed150_NeikiAnalytics.exe

  • Size

    896KB

  • Sample

    240523-y4ct9seh5x

  • MD5

    da3608d3303bc261b9d2ab6c4feed150

  • SHA1

    96d04abf482dff8231b6c4c4899f451306ade1e5

  • SHA256

    41c5aa83652b5c733ea668d86db324c589fe94bd6640b84461445066ee64d177

  • SHA512

    50a0ea5a0a19b9b7e87bd54f34da315682f6b1a87a9dd7f8be5933c7804e59f9536286ce60956f4280810e388b880ef3fc58b5d7e7dd5964087e0667eb3a46df

  • SSDEEP

    24576:e7kqrT2zJMSbgDNbHZdtc6hLbQhayY4Fp:2kqrqMScx5dK6hCayd

Malware Config

Targets

    • Target

      da3608d3303bc261b9d2ab6c4feed150_NeikiAnalytics.exe

    • Size

      896KB

    • MD5

      da3608d3303bc261b9d2ab6c4feed150

    • SHA1

      96d04abf482dff8231b6c4c4899f451306ade1e5

    • SHA256

      41c5aa83652b5c733ea668d86db324c589fe94bd6640b84461445066ee64d177

    • SHA512

      50a0ea5a0a19b9b7e87bd54f34da315682f6b1a87a9dd7f8be5933c7804e59f9536286ce60956f4280810e388b880ef3fc58b5d7e7dd5964087e0667eb3a46df

    • SSDEEP

      24576:e7kqrT2zJMSbgDNbHZdtc6hLbQhayY4Fp:2kqrqMScx5dK6hCayd

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (64) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks