General

  • Target

    56ca3210b38b642f71c1c4b00bd65930_NeikiAnalytics.exe

  • Size

    2.6MB

  • Sample

    240602-jwzlqsfe6y

  • MD5

    56ca3210b38b642f71c1c4b00bd65930

  • SHA1

    1876d0144bec75d9c1863408ab275a0b3b44d8f9

  • SHA256

    e04438bd374e823e38ae533f9f04e898b49144ee399f766ff97a83d9f6c5dae5

  • SHA512

    17c156ded304a98916d6a1eb4454da295f0a55e372fdc893f681014fef4b6129df23222788357c98a6335b78f07df2661180d46b9e93040ce511a3b04181522d

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBFB/bS:sxX7QnxrloE5dpUpSb

Malware Config

Targets

    • Target

      56ca3210b38b642f71c1c4b00bd65930_NeikiAnalytics.exe

    • Size

      2.6MB

    • MD5

      56ca3210b38b642f71c1c4b00bd65930

    • SHA1

      1876d0144bec75d9c1863408ab275a0b3b44d8f9

    • SHA256

      e04438bd374e823e38ae533f9f04e898b49144ee399f766ff97a83d9f6c5dae5

    • SHA512

      17c156ded304a98916d6a1eb4454da295f0a55e372fdc893f681014fef4b6129df23222788357c98a6335b78f07df2661180d46b9e93040ce511a3b04181522d

    • SSDEEP

      49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBFB/bS:sxX7QnxrloE5dpUpSb

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks