General

  • Target

    12e16a008a5813732935972704d9a290_NeikiAnalytics.exe

  • Size

    3.0MB

  • Sample

    240526-ttvj4sdc43

  • MD5

    12e16a008a5813732935972704d9a290

  • SHA1

    3fde23c769943deb96ba0150f7d1d555c69384d8

  • SHA256

    e39512682c0be56ce868cd235dcff9cc304b28bfabdf2233f696e605dacb7103

  • SHA512

    1906770a2a1083c283d7d03930a550039e7834500a3d68157b1d6a237edee757ceb9eb09db0893aa33f45ae9e46edb430e72716451c2500006c9de6afeee11c7

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBwB/bSqz8b6LNX:sxX7QnxrloE5dpUpXbVz8eLF

Malware Config

Targets

    • Target

      12e16a008a5813732935972704d9a290_NeikiAnalytics.exe

    • Size

      3.0MB

    • MD5

      12e16a008a5813732935972704d9a290

    • SHA1

      3fde23c769943deb96ba0150f7d1d555c69384d8

    • SHA256

      e39512682c0be56ce868cd235dcff9cc304b28bfabdf2233f696e605dacb7103

    • SHA512

      1906770a2a1083c283d7d03930a550039e7834500a3d68157b1d6a237edee757ceb9eb09db0893aa33f45ae9e46edb430e72716451c2500006c9de6afeee11c7

    • SSDEEP

      49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBwB/bSqz8b6LNX:sxX7QnxrloE5dpUpXbVz8eLF

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks