General

  • Target

    4fb068470c1c5ef9cbfec68615bc40c0_NeikiAnalytics.exe

  • Size

    232KB

  • Sample

    240604-kxhkaaca64

  • MD5

    4fb068470c1c5ef9cbfec68615bc40c0

  • SHA1

    171d2253d481e1b670e734dcd667b5d002ff3daa

  • SHA256

    d7920ba0b738757480f805f169ce3c2598b5d15eeb6eb00a504bc020660c7727

  • SHA512

    8e33ecc09033d2916971433b73a465941c7efca2e64381ede946ff7a1365ef68a94bf1ebaf4ed086a16e69d9108dff6f47c5b13f44ac63664641302dc454c348

  • SSDEEP

    6144:s1UDRcn5R2C1mZ7qAkklcFcwUZcFAVJKyIfgAB:s1eRC5T1mZ2pkqWVDIfgk

Malware Config

Targets

    • Target

      4fb068470c1c5ef9cbfec68615bc40c0_NeikiAnalytics.exe

    • Size

      232KB

    • MD5

      4fb068470c1c5ef9cbfec68615bc40c0

    • SHA1

      171d2253d481e1b670e734dcd667b5d002ff3daa

    • SHA256

      d7920ba0b738757480f805f169ce3c2598b5d15eeb6eb00a504bc020660c7727

    • SHA512

      8e33ecc09033d2916971433b73a465941c7efca2e64381ede946ff7a1365ef68a94bf1ebaf4ed086a16e69d9108dff6f47c5b13f44ac63664641302dc454c348

    • SSDEEP

      6144:s1UDRcn5R2C1mZ7qAkklcFcwUZcFAVJKyIfgAB:s1eRC5T1mZ2pkqWVDIfgk

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks