General

  • Target

    b3c4c3254069635c79955f7a45945e30_NeikiAnalytics.exe

  • Size

    2.7MB

  • Sample

    240603-sq4g6saf6y

  • MD5

    b3c4c3254069635c79955f7a45945e30

  • SHA1

    7f0f479d5739275619780d677bd5b4362c2fa1fb

  • SHA256

    9ad4cba3e9525fdd7b6ff8eb79e24176106a048e10eb988336ad2618b1a6321b

  • SHA512

    fd1c6ea1f863a55180a6f81edbef07c1783cdd9f53cd514d97a36d3624cf9afd8ce11580f61d3b77dcaad7136a5c3a0114503c2f2d8733d2a57624df72977eaf

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBq9w4Sx:+R0pI/IQlUoMPdmpSp44

Malware Config

Targets

    • Target

      b3c4c3254069635c79955f7a45945e30_NeikiAnalytics.exe

    • Size

      2.7MB

    • MD5

      b3c4c3254069635c79955f7a45945e30

    • SHA1

      7f0f479d5739275619780d677bd5b4362c2fa1fb

    • SHA256

      9ad4cba3e9525fdd7b6ff8eb79e24176106a048e10eb988336ad2618b1a6321b

    • SHA512

      fd1c6ea1f863a55180a6f81edbef07c1783cdd9f53cd514d97a36d3624cf9afd8ce11580f61d3b77dcaad7136a5c3a0114503c2f2d8733d2a57624df72977eaf

    • SSDEEP

      49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBq9w4Sx:+R0pI/IQlUoMPdmpSp44

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks