General

  • Target

    103eaa00dd2b113e05e1069e9d760f00_NeikiAnalytics.exe

  • Size

    316KB

  • Sample

    240528-2eq75sfb21

  • MD5

    103eaa00dd2b113e05e1069e9d760f00

  • SHA1

    edabf2c1b8cb154f6a4c6ad40b76f410a159c7b3

  • SHA256

    0006ae9bddfa4a5d017ce9b759d6edfd802053dd74f571ce4550b7f804e7d3bf

  • SHA512

    bdf1ab0a1c85d980574e65685e427cce74c38e9d3b4422eff3caf40071146e7dc916f9187065cd50636b4884d5e86331c963e0d65d8cc3767a66f89998ecc8eb

  • SSDEEP

    6144:BIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPysEPArwVe:4KofHfHTXQLzgvnzHPowYbvrjD/L7QP7

Malware Config

Targets

    • Target

      103eaa00dd2b113e05e1069e9d760f00_NeikiAnalytics.exe

    • Size

      316KB

    • MD5

      103eaa00dd2b113e05e1069e9d760f00

    • SHA1

      edabf2c1b8cb154f6a4c6ad40b76f410a159c7b3

    • SHA256

      0006ae9bddfa4a5d017ce9b759d6edfd802053dd74f571ce4550b7f804e7d3bf

    • SHA512

      bdf1ab0a1c85d980574e65685e427cce74c38e9d3b4422eff3caf40071146e7dc916f9187065cd50636b4884d5e86331c963e0d65d8cc3767a66f89998ecc8eb

    • SSDEEP

      6144:BIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPysEPArwVe:4KofHfHTXQLzgvnzHPowYbvrjD/L7QP7

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks