General

  • Target

    17842195275285895b853cb580f4ad50_NeikiAnalytics.exe

  • Size

    1.6MB

  • Sample

    240604-at49rseg7w

  • MD5

    17842195275285895b853cb580f4ad50

  • SHA1

    e2406b774204c6bc2fa14ee19b3765bfee4f9ccf

  • SHA256

    2c781479d455056389eaffc41e3295730fa4524fda5fa456b4c6c209e6b74c75

  • SHA512

    83264c0a6c28431b412aa63cc555bfef5105c7bf14b3edf26b668e16b370637e4fd5c66e3f84de72729022f30d144a1c266f410e8234a7cb86226f8404e6f831

  • SSDEEP

    24576:Vj4GR20CfeE3/dyWEpiIzNIVA2mr4o66LiqZj7Up8bnPJvnB6mwntfvrnTP+:F4GQh9PdyWEpi4I1iWkPUYvsntfjnb+

Malware Config

Targets

    • Target

      17842195275285895b853cb580f4ad50_NeikiAnalytics.exe

    • Size

      1.6MB

    • MD5

      17842195275285895b853cb580f4ad50

    • SHA1

      e2406b774204c6bc2fa14ee19b3765bfee4f9ccf

    • SHA256

      2c781479d455056389eaffc41e3295730fa4524fda5fa456b4c6c209e6b74c75

    • SHA512

      83264c0a6c28431b412aa63cc555bfef5105c7bf14b3edf26b668e16b370637e4fd5c66e3f84de72729022f30d144a1c266f410e8234a7cb86226f8404e6f831

    • SSDEEP

      24576:Vj4GR20CfeE3/dyWEpiIzNIVA2mr4o66LiqZj7Up8bnPJvnB6mwntfvrnTP+:F4GQh9PdyWEpi4I1iWkPUYvsntfjnb+

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks