General

  • Target

    993c01226bbb74701aa5bc789a9294e0_NeikiAnalytics.exe

  • Size

    41KB

  • Sample

    240524-1pzrlacd4v

  • MD5

    993c01226bbb74701aa5bc789a9294e0

  • SHA1

    eed8ef7d9344e4cb6b0d6db86121ce9803fc896e

  • SHA256

    a857667fe80dec03895bfecf0aa1186802a6cf45c9a1a3e0a104578ea77699f0

  • SHA512

    c363da7b3346234b2583ead64edc5f998f25b91c364aac0aa417575303f1120245c85d4376c55389f45c706a789fa3d111998a6ebeebea6d1fca9a54e1aeac58

  • SSDEEP

    768:IMAQ+BzWPEwnE+KHM2/fWsaoOD/hosxp0TlZUAr33U/hKsoJUrA7xaEqzA4:t3x85+Ks2zaoODdp0RZUzhgOpz/

Malware Config

Targets

    • Target

      993c01226bbb74701aa5bc789a9294e0_NeikiAnalytics.exe

    • Size

      41KB

    • MD5

      993c01226bbb74701aa5bc789a9294e0

    • SHA1

      eed8ef7d9344e4cb6b0d6db86121ce9803fc896e

    • SHA256

      a857667fe80dec03895bfecf0aa1186802a6cf45c9a1a3e0a104578ea77699f0

    • SHA512

      c363da7b3346234b2583ead64edc5f998f25b91c364aac0aa417575303f1120245c85d4376c55389f45c706a789fa3d111998a6ebeebea6d1fca9a54e1aeac58

    • SSDEEP

      768:IMAQ+BzWPEwnE+KHM2/fWsaoOD/hosxp0TlZUAr33U/hKsoJUrA7xaEqzA4:t3x85+Ks2zaoODdp0RZUzhgOpz/

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks