General

  • Target

    2614a1f6078ae09544ddb311c3772f20_NeikiAnalytics.exe

  • Size

    78KB

  • Sample

    240605-bwr8naab7y

  • MD5

    2614a1f6078ae09544ddb311c3772f20

  • SHA1

    b8011bde622706e0cef66e47002bb58412665447

  • SHA256

    6456774949a48dfe3868e16460f9257e5d763a73b618fd75ef904ce4def1fbce

  • SHA512

    adcced41e9ef6e8f730fbad004f96bfd67de353d3ff3465a0bac6ffc3c5bc7cc58bceb3874f61c92a63b16901ac4fdc758a565d245884b370177454bd9eb2f2a

  • SSDEEP

    768:hpQNwC3BEddsEqOt/hyJF+x3BEJwRrPHisKl4qhY:reTce/U/hKYuKPHisKldhY

Malware Config

Targets

    • Target

      2614a1f6078ae09544ddb311c3772f20_NeikiAnalytics.exe

    • Size

      78KB

    • MD5

      2614a1f6078ae09544ddb311c3772f20

    • SHA1

      b8011bde622706e0cef66e47002bb58412665447

    • SHA256

      6456774949a48dfe3868e16460f9257e5d763a73b618fd75ef904ce4def1fbce

    • SHA512

      adcced41e9ef6e8f730fbad004f96bfd67de353d3ff3465a0bac6ffc3c5bc7cc58bceb3874f61c92a63b16901ac4fdc758a565d245884b370177454bd9eb2f2a

    • SSDEEP

      768:hpQNwC3BEddsEqOt/hyJF+x3BEJwRrPHisKl4qhY:reTce/U/hKYuKPHisKldhY

    • Modifies visibility of file extensions in Explorer

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks