General

  • Target

    604f9b2e9879244d06ecd7724abf41e0_NeikiAnalytics.exe

  • Size

    3.0MB

  • Sample

    240602-y9gemsdh81

  • MD5

    604f9b2e9879244d06ecd7724abf41e0

  • SHA1

    3c168c8358944a55492aff6be829493c42e6bb30

  • SHA256

    227fe37f1e0d5be334b68dbdb344bfabacf13472d363cfa785e3ad54cbe015c1

  • SHA512

    40716e78d0b52bed71c9e6795b68c388bb89ab31724da410e2472c988f14955683045324a6b97cc7e9bec16f3c60cff3e249d33def082d901e6fd83726f0bc27

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBqB/bSqz8:sxX7QnxrloE5dpUplbVz8

Malware Config

Targets

    • Target

      604f9b2e9879244d06ecd7724abf41e0_NeikiAnalytics.exe

    • Size

      3.0MB

    • MD5

      604f9b2e9879244d06ecd7724abf41e0

    • SHA1

      3c168c8358944a55492aff6be829493c42e6bb30

    • SHA256

      227fe37f1e0d5be334b68dbdb344bfabacf13472d363cfa785e3ad54cbe015c1

    • SHA512

      40716e78d0b52bed71c9e6795b68c388bb89ab31724da410e2472c988f14955683045324a6b97cc7e9bec16f3c60cff3e249d33def082d901e6fd83726f0bc27

    • SSDEEP

      49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBqB/bSqz8:sxX7QnxrloE5dpUplbVz8

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks