General

  • Target

    231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe

  • Size

    3.6MB

  • Sample

    240527-he326acb59

  • MD5

    231feec23bee69ca907eee006c410a10

  • SHA1

    d31baf06e944e455ffb311e8200721621ec11dad

  • SHA256

    2e28e8a244430d0dc9fc788a405bf044a4a6fd8ebefcf6ba9c78bd15e1001fcf

  • SHA512

    9b182b1fbe428a6806418071b913d83469ef3f978eef19f1f765a30e04bfa88312e5a17ba703d932e4bc19bc65ce053778e3917549b68ff4d625cfef54d9abf1

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBeB/bSqz8:sxX7QnxrloE5dpUp1bVz8

Malware Config

Targets

    • Target

      231feec23bee69ca907eee006c410a10_NeikiAnalytics.exe

    • Size

      3.6MB

    • MD5

      231feec23bee69ca907eee006c410a10

    • SHA1

      d31baf06e944e455ffb311e8200721621ec11dad

    • SHA256

      2e28e8a244430d0dc9fc788a405bf044a4a6fd8ebefcf6ba9c78bd15e1001fcf

    • SHA512

      9b182b1fbe428a6806418071b913d83469ef3f978eef19f1f765a30e04bfa88312e5a17ba703d932e4bc19bc65ce053778e3917549b68ff4d625cfef54d9abf1

    • SSDEEP

      49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBeB/bSqz8:sxX7QnxrloE5dpUp1bVz8

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks