General

  • Target

    3d819472707f4efe6756a98f6454e710_NeikiAnalytics.exe

  • Size

    2.7MB

  • Sample

    240526-alqreafg4y

  • MD5

    3d819472707f4efe6756a98f6454e710

  • SHA1

    b3bb1ed1ea54df7072398887a66759ae7efb0d44

  • SHA256

    d7e8c3364e7548bc8241142010af52749433ee69a9c2f32a1048643ddb4b781e

  • SHA512

    ff281a1fc39b560c31f01f7475eba565ed10792f8c3aea6ca2508a3f4546f80ba56c4d7ef6bac64d14feda81db580ba86bd4072783a7cb512be5e9d64a995023

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBh9w4Sx:+R0pI/IQlUoMPdmpSpt4

Malware Config

Targets

    • Target

      3d819472707f4efe6756a98f6454e710_NeikiAnalytics.exe

    • Size

      2.7MB

    • MD5

      3d819472707f4efe6756a98f6454e710

    • SHA1

      b3bb1ed1ea54df7072398887a66759ae7efb0d44

    • SHA256

      d7e8c3364e7548bc8241142010af52749433ee69a9c2f32a1048643ddb4b781e

    • SHA512

      ff281a1fc39b560c31f01f7475eba565ed10792f8c3aea6ca2508a3f4546f80ba56c4d7ef6bac64d14feda81db580ba86bd4072783a7cb512be5e9d64a995023

    • SSDEEP

      49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBh9w4Sx:+R0pI/IQlUoMPdmpSpt4

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks