General

  • Target

    ab261968ce7e90238fce8a8126552b50_NeikiAnalytics.exe

  • Size

    78KB

  • Sample

    240614-hs93mazaka

  • MD5

    ab261968ce7e90238fce8a8126552b50

  • SHA1

    3dcc27c114ebfa16c25bf76029833e73d0cfae0a

  • SHA256

    3594bd084fb6ade084cbb35ab63898088e0efb0754e42c67713b70b7e36f6ee7

  • SHA512

    9d7b867c3030bad01d8ef833cae568d6cdf094ebe56c5abc3efae67b75b9320a9fa111fb83586cdd6ffda0896d97bd4e06188cbecb8d8a600f247c726eee0eee

  • SSDEEP

    768:hpQNwC3BEddsEqOt/hyJF+x3BEJwRrPHisKl4qhZ:reTce/U/hKYuKPHisKldhZ

Malware Config

Targets

    • Target

      ab261968ce7e90238fce8a8126552b50_NeikiAnalytics.exe

    • Size

      78KB

    • MD5

      ab261968ce7e90238fce8a8126552b50

    • SHA1

      3dcc27c114ebfa16c25bf76029833e73d0cfae0a

    • SHA256

      3594bd084fb6ade084cbb35ab63898088e0efb0754e42c67713b70b7e36f6ee7

    • SHA512

      9d7b867c3030bad01d8ef833cae568d6cdf094ebe56c5abc3efae67b75b9320a9fa111fb83586cdd6ffda0896d97bd4e06188cbecb8d8a600f247c726eee0eee

    • SSDEEP

      768:hpQNwC3BEddsEqOt/hyJF+x3BEJwRrPHisKl4qhZ:reTce/U/hKYuKPHisKldhZ

    • Modifies visibility of file extensions in Explorer

    • Disables RegEdit via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks