General

  • Target

    63e8a9af90da3bdaa520fb5ce3c46740_NeikiAnalytics.exe

  • Size

    17KB

  • Sample

    240613-gpg21a1ajl

  • MD5

    63e8a9af90da3bdaa520fb5ce3c46740

  • SHA1

    eb66f2d625c3aad43eb204b1baf692ab7e973917

  • SHA256

    733d7bf09e1342caebdcc99b478b7c29d7258c6ceb5dd24aa85a472e166962c1

  • SHA512

    431504e4173d3be3752c10bad4fd85866b5c753cd90f5a866d21b393f8d789777b6b1ca07ecc8b5dd14d3d86b8915fc80849c806d4b81f049cfed1fd78b74d54

  • SSDEEP

    384:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/eU:IMAQ+BzWPEwnE+KHM2/eU

Malware Config

Targets

    • Target

      63e8a9af90da3bdaa520fb5ce3c46740_NeikiAnalytics.exe

    • Size

      17KB

    • MD5

      63e8a9af90da3bdaa520fb5ce3c46740

    • SHA1

      eb66f2d625c3aad43eb204b1baf692ab7e973917

    • SHA256

      733d7bf09e1342caebdcc99b478b7c29d7258c6ceb5dd24aa85a472e166962c1

    • SHA512

      431504e4173d3be3752c10bad4fd85866b5c753cd90f5a866d21b393f8d789777b6b1ca07ecc8b5dd14d3d86b8915fc80849c806d4b81f049cfed1fd78b74d54

    • SSDEEP

      384:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/eU:IMAQ+BzWPEwnE+KHM2/eU

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks