General

  • Target

    085824b451f842390ecdf261ececcd40_NeikiAnalytics.cab

  • Size

    93KB

  • Sample

    240525-w6g6nadf2y

  • MD5

    085824b451f842390ecdf261ececcd40

  • SHA1

    9196c2ce300cafc293f827c6cebe018568a6947e

  • SHA256

    bf6022dbfb93e276acd1643baa13109abd22783fade76a064e803c42a3676c94

  • SHA512

    1f13e0bc0926b3badd697210835f3032ba03e1c713f75fd1dfc4cc483a7fceef5cc59ba00763880d013a1790cdbf224eb5d1d2c11ad5e53b4dbaf3ee4ebd01a2

  • SSDEEP

    1536:KwxZoE1uLDI7oPYu0if4uuWvXB9QRO96hCKPgV9Fzw+CBXVDblKtWy:KwflmDgAYu004LGyRO9bK49Fzw+CBXVK

Malware Config

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

C2

https://steamcommunity.com/profiles/76561199686524322

https://t.me/k0mono

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.4.1 Safari/605.1.15 Ddg/17.4.1

Targets

    • Target

      updater

    • Size

      200KB

    • MD5

      d2fa3945b18f3eaa24c48a098c50046c

    • SHA1

      d778764a4d298798cf3574a2d4153d1cadafc467

    • SHA256

      f5c65dbdb865afffc21031f9a90afe428acffd387ff12554fcc096701a0b8d11

    • SHA512

      3fa9a946d837148dae450b0238004c83d630fd5ea7431b43635c4f1dc38c546f5822dc08c294010ccbd45559ba618fd516e32b515fb6565c18e81167060c864a

    • SSDEEP

      3072:Ef8yYNF9ex7nLydc8NwEfgjp9yuzKrDFU+XC3bXM/1WXBQ:E8yQF9QaOtnVzEm+SbWWXG

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Target

      updaterExe

    • Size

      200KB

    • MD5

      d2fa3945b18f3eaa24c48a098c50046c

    • SHA1

      d778764a4d298798cf3574a2d4153d1cadafc467

    • SHA256

      f5c65dbdb865afffc21031f9a90afe428acffd387ff12554fcc096701a0b8d11

    • SHA512

      3fa9a946d837148dae450b0238004c83d630fd5ea7431b43635c4f1dc38c546f5822dc08c294010ccbd45559ba618fd516e32b515fb6565c18e81167060c864a

    • SSDEEP

      3072:Ef8yYNF9ex7nLydc8NwEfgjp9yuzKrDFU+XC3bXM/1WXBQ:E8yQF9QaOtnVzEm+SbWWXG

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

8
T1552

Credentials In Files

8
T1552.001

Discovery

Query Registry

6
T1012

System Information Discovery

6
T1082

Collection

Data from Local System

8
T1005

Tasks