General

  • Target

    13db5fce28202ca0e14a33391bcf75c0_NeikiAnalytics.exe

  • Size

    309KB

  • Sample

    240604-21efgaed6s

  • MD5

    13db5fce28202ca0e14a33391bcf75c0

  • SHA1

    f806eec9c252c59a4bc793af0b9601d5083d0993

  • SHA256

    6ee27ac191cd55293cf5f0d29d10e5643ed43554fbd81d46ad7808ee20dcc72f

  • SHA512

    f41c38e95d2ff5f54d4d05e436bbb5706159700fdf977f89362dd6f61052c778d3dbed35aba8e97613ab6435e267a08e70668fc1fa034bfc1a13480d028c39af

  • SSDEEP

    6144:NQZXVRBpE3hetT5tBTyTmYokr12Hd1x2Ezp87G9Aen7u91zjTTy:EVRTE3het1yJh2HduH7GqjTy

Malware Config

Targets

    • Target

      13db5fce28202ca0e14a33391bcf75c0_NeikiAnalytics.exe

    • Size

      309KB

    • MD5

      13db5fce28202ca0e14a33391bcf75c0

    • SHA1

      f806eec9c252c59a4bc793af0b9601d5083d0993

    • SHA256

      6ee27ac191cd55293cf5f0d29d10e5643ed43554fbd81d46ad7808ee20dcc72f

    • SHA512

      f41c38e95d2ff5f54d4d05e436bbb5706159700fdf977f89362dd6f61052c778d3dbed35aba8e97613ab6435e267a08e70668fc1fa034bfc1a13480d028c39af

    • SSDEEP

      6144:NQZXVRBpE3hetT5tBTyTmYokr12Hd1x2Ezp87G9Aen7u91zjTTy:EVRTE3het1yJh2HduH7GqjTy

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks