General

  • Target

    fa891cb35b86f03c5d8db2a340d006c0_NeikiAnalytics.exe

  • Size

    909KB

  • Sample

    240524-sczl3aaa2s

  • MD5

    fa891cb35b86f03c5d8db2a340d006c0

  • SHA1

    020bef77268b3c32aec544732b7d629a9c93286c

  • SHA256

    afeb291809fafeb14271ff00cbcde1e992634da04c61221e763e5c677a78c101

  • SHA512

    c9cfcc33eb02740a874d6334f962269b182164f776aec23be91cead0bb7dca3438e689cbf25e7df452f9794366db8580409e293931ec8014187b8c57e09f0421

  • SSDEEP

    24576:y5F2iRkRqO6/xfm/94AKhbtlXnf3xkQdfb:S2akRl6/xuV4AK9D5kQB

Malware Config

Targets

    • Target

      fa891cb35b86f03c5d8db2a340d006c0_NeikiAnalytics.exe

    • Size

      909KB

    • MD5

      fa891cb35b86f03c5d8db2a340d006c0

    • SHA1

      020bef77268b3c32aec544732b7d629a9c93286c

    • SHA256

      afeb291809fafeb14271ff00cbcde1e992634da04c61221e763e5c677a78c101

    • SHA512

      c9cfcc33eb02740a874d6334f962269b182164f776aec23be91cead0bb7dca3438e689cbf25e7df452f9794366db8580409e293931ec8014187b8c57e09f0421

    • SSDEEP

      24576:y5F2iRkRqO6/xfm/94AKhbtlXnf3xkQdfb:S2akRl6/xuV4AK9D5kQB

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (55) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks