General

  • Target

    2b81bc43a5f1578cb4b5e1db7f1cb700_NeikiAnalytics.exe

  • Size

    101KB

  • Sample

    240607-bnrxxsgb59

  • MD5

    2b81bc43a5f1578cb4b5e1db7f1cb700

  • SHA1

    6e538da119fa2a0e1f594eca3e83cee428e6ea45

  • SHA256

    63bafd0c8173000d3d5a1b05e4167f1254f36491758424dc7575fd3bed0ef28d

  • SHA512

    0ebe233706dff5778a4ac3a03106df8d5a9ffbfd880b4dfbf02a847a18e112418d46bb04dc1a28a209477d51616b23ab4f2a68bcfa9584d1c001d4a335618483

  • SSDEEP

    1536:A8cKWUH40SsmjFAQ4+Mrw1CPof4a30ahkyYyoe5vda/WrQFVwEKwNuyyU3:A8crUHnm6BjAQazY05FaOrQ3wEK2uA

Malware Config

Targets

    • Target

      2b81bc43a5f1578cb4b5e1db7f1cb700_NeikiAnalytics.exe

    • Size

      101KB

    • MD5

      2b81bc43a5f1578cb4b5e1db7f1cb700

    • SHA1

      6e538da119fa2a0e1f594eca3e83cee428e6ea45

    • SHA256

      63bafd0c8173000d3d5a1b05e4167f1254f36491758424dc7575fd3bed0ef28d

    • SHA512

      0ebe233706dff5778a4ac3a03106df8d5a9ffbfd880b4dfbf02a847a18e112418d46bb04dc1a28a209477d51616b23ab4f2a68bcfa9584d1c001d4a335618483

    • SSDEEP

      1536:A8cKWUH40SsmjFAQ4+Mrw1CPof4a30ahkyYyoe5vda/WrQFVwEKwNuyyU3:A8crUHnm6BjAQazY05FaOrQ3wEK2uA

    • Phemedrone

      An information and wallet stealer written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks