General

  • Target

    23f2361b4db73539e974987b304b1160_NeikiAnalytics.exe

  • Size

    3.6MB

  • Sample

    240527-hvfa2acg47

  • MD5

    23f2361b4db73539e974987b304b1160

  • SHA1

    9326925ce8a4c2e4c1283e905847412405ffe22f

  • SHA256

    b13d5e8fe2f0375abf3195c21d85158ba643ca6e72bdf784097b1f2e6846f0d3

  • SHA512

    f2f27419bffa66df3b619c0cd4f1d0616c6bfa0858b01a41a00c81ee4c6bcbf87ef413b22ccc951b18e108a5b1081b3f9537eb2b9235f518c4bedad300004ad0

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBRB/bSqz8:sxX7QnxrloE5dpUp2bVz8

Malware Config

Targets

    • Target

      23f2361b4db73539e974987b304b1160_NeikiAnalytics.exe

    • Size

      3.6MB

    • MD5

      23f2361b4db73539e974987b304b1160

    • SHA1

      9326925ce8a4c2e4c1283e905847412405ffe22f

    • SHA256

      b13d5e8fe2f0375abf3195c21d85158ba643ca6e72bdf784097b1f2e6846f0d3

    • SHA512

      f2f27419bffa66df3b619c0cd4f1d0616c6bfa0858b01a41a00c81ee4c6bcbf87ef413b22ccc951b18e108a5b1081b3f9537eb2b9235f518c4bedad300004ad0

    • SSDEEP

      49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBRB/bSqz8:sxX7QnxrloE5dpUp2bVz8

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks