Resubmissions

General

  • Target

    e7997d284fa0948aa095d3164892c3b0_NeikiAnalytics.exe

  • Size

    194KB

  • Sample

    240523-yyl6raeg53

  • MD5

    e7997d284fa0948aa095d3164892c3b0

  • SHA1

    b303e688c101cd16393b65a582b78b607c831906

  • SHA256

    8872644f90f656be51f002dfcebc425a5c9957434b8ff4dfa1dc02a501cd6430

  • SHA512

    1bdf601953dced0b65442b4bf56f7c91e2849675f6a8989c3ca78844458addf04643f8a6ab7911d06780e8ace3b955f6355714464a5d4bfeef4166eb10a17529

  • SSDEEP

    6144:CoCNFCs0EPwiamZCGJQ0n4ImotUJxhnZ1D:CFoiamcgmpr1

Malware Config

Targets

    • Target

      e7997d284fa0948aa095d3164892c3b0_NeikiAnalytics.exe

    • Size

      194KB

    • MD5

      e7997d284fa0948aa095d3164892c3b0

    • SHA1

      b303e688c101cd16393b65a582b78b607c831906

    • SHA256

      8872644f90f656be51f002dfcebc425a5c9957434b8ff4dfa1dc02a501cd6430

    • SHA512

      1bdf601953dced0b65442b4bf56f7c91e2849675f6a8989c3ca78844458addf04643f8a6ab7911d06780e8ace3b955f6355714464a5d4bfeef4166eb10a17529

    • SSDEEP

      6144:CoCNFCs0EPwiamZCGJQ0n4ImotUJxhnZ1D:CFoiamcgmpr1

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (74) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks