General

  • Target

    2813329912d11ddc544365ec0f35d970_NeikiAnalytics.exe

  • Size

    2.0MB

  • Sample

    240611-fdrlmavcpf

  • MD5

    2813329912d11ddc544365ec0f35d970

  • SHA1

    7d1b5fe05159b47b93efb3d38dfc7d5f8ca02429

  • SHA256

    e5819f8726451e5707e50c5a14c39af1ba6586f14867ecf2a330e013087809c2

  • SHA512

    b5b7fe87488919e1a23b3041082fb9f7994ae54821df1d0ff5def924e104131254813ffb96db0e0c092768314386f4331a123a6013153512f2e76940f255b9c8

  • SSDEEP

    49152:XWboukkdnZoG+cX5iiy+AD8ZnCivq7G1T/HGNUoVBC1GVGoeXe:XWDkkdn+nI/r2ivK8cUoVw1G81u

Malware Config

Targets

    • Target

      2813329912d11ddc544365ec0f35d970_NeikiAnalytics.exe

    • Size

      2.0MB

    • MD5

      2813329912d11ddc544365ec0f35d970

    • SHA1

      7d1b5fe05159b47b93efb3d38dfc7d5f8ca02429

    • SHA256

      e5819f8726451e5707e50c5a14c39af1ba6586f14867ecf2a330e013087809c2

    • SHA512

      b5b7fe87488919e1a23b3041082fb9f7994ae54821df1d0ff5def924e104131254813ffb96db0e0c092768314386f4331a123a6013153512f2e76940f255b9c8

    • SSDEEP

      49152:XWboukkdnZoG+cX5iiy+AD8ZnCivq7G1T/HGNUoVBC1GVGoeXe:XWDkkdn+nI/r2ivK8cUoVw1G81u

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks