General

  • Target

    2d162200ec266b928843253b3d459d00_NeikiAnalytics.exe

  • Size

    78KB

  • Sample

    240607-b3yzsafe4s

  • MD5

    2d162200ec266b928843253b3d459d00

  • SHA1

    c5582bd718567f32db7140d27b1136959a59a659

  • SHA256

    188851c827f729f48a94c318907bf8ab9f7ba1b1f5b701f17a2846d422281fbb

  • SHA512

    62b4fb6ce5a8f968edd665e64381f19e55956c0715c0e111ef787022b3f31566ccfe4b179c68221a628520b7a47cf04b602edeb0b2f302415390fd02d3b0e5f6

  • SSDEEP

    768:RpQNwC3BEddsEqOt/hyJF+x3BEJwRrPHisKl4qhx:7eTce/U/hKYuKPHisKldhx

Malware Config

Targets

    • Target

      2d162200ec266b928843253b3d459d00_NeikiAnalytics.exe

    • Size

      78KB

    • MD5

      2d162200ec266b928843253b3d459d00

    • SHA1

      c5582bd718567f32db7140d27b1136959a59a659

    • SHA256

      188851c827f729f48a94c318907bf8ab9f7ba1b1f5b701f17a2846d422281fbb

    • SHA512

      62b4fb6ce5a8f968edd665e64381f19e55956c0715c0e111ef787022b3f31566ccfe4b179c68221a628520b7a47cf04b602edeb0b2f302415390fd02d3b0e5f6

    • SSDEEP

      768:RpQNwC3BEddsEqOt/hyJF+x3BEJwRrPHisKl4qhx:7eTce/U/hKYuKPHisKldhx

    • Modifies visibility of file extensions in Explorer

    • Disables RegEdit via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks