General

  • Target

    beeeb680327fb4ae4c7bd0b59a646170_NeikiAnalytics.exe

  • Size

    301KB

  • Sample

    240524-29w2waef2y

  • MD5

    beeeb680327fb4ae4c7bd0b59a646170

  • SHA1

    622d10e7894e6aac3418d625360cb79d15b2ee81

  • SHA256

    3af4fc33f0a68a6e6d8352d001dd3705ee5727014a23150111344f674dc214bd

  • SHA512

    a7e8e593098d74b463698fc258b6458f568a9a1c63b968cb8d330295704271e232bb57eb2e8e08ea16a6d4ff6770fcaf53de8ccf26f7cc6431cd36b6f6c10cdb

  • SSDEEP

    6144:KRGBZUXr1YK+pX8lPIje1jtviF5roUojC/64mbK4BVJetMq:KQrUXr1YKGav+g2V0AMq

Malware Config

Targets

    • Target

      beeeb680327fb4ae4c7bd0b59a646170_NeikiAnalytics.exe

    • Size

      301KB

    • MD5

      beeeb680327fb4ae4c7bd0b59a646170

    • SHA1

      622d10e7894e6aac3418d625360cb79d15b2ee81

    • SHA256

      3af4fc33f0a68a6e6d8352d001dd3705ee5727014a23150111344f674dc214bd

    • SHA512

      a7e8e593098d74b463698fc258b6458f568a9a1c63b968cb8d330295704271e232bb57eb2e8e08ea16a6d4ff6770fcaf53de8ccf26f7cc6431cd36b6f6c10cdb

    • SSDEEP

      6144:KRGBZUXr1YK+pX8lPIje1jtviF5roUojC/64mbK4BVJetMq:KQrUXr1YKGav+g2V0AMq

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (59) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks