General

  • Target

    dc3a1bb107a50b9271e9152915d738d0_NeikiAnalytics.exe

  • Size

    5.0MB

  • Sample

    240616-g2qvnssflh

  • MD5

    dc3a1bb107a50b9271e9152915d738d0

  • SHA1

    89408dec96650fbfe2713cc82865e935f7fbe1a7

  • SHA256

    b70e85bcd6e8f1c9c65ac57d7c4c46346fc4f0194caa9b45e3f1d1ff8d9b6d7e

  • SHA512

    47aa4b676685ba5d64fbc0c9487545b7769987375f4af64ac05857064f3e9dc4dea576a41878d0e901840fd91a23b04f29f8ea33971b5710f017c8ff54d06b6b

  • SSDEEP

    98304:ADqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2HND527BWG:ADqPe1Cxcxk3ZAEUadzR8yc4HNVQBWG

Malware Config

Targets

    • Target

      dc3a1bb107a50b9271e9152915d738d0_NeikiAnalytics.exe

    • Size

      5.0MB

    • MD5

      dc3a1bb107a50b9271e9152915d738d0

    • SHA1

      89408dec96650fbfe2713cc82865e935f7fbe1a7

    • SHA256

      b70e85bcd6e8f1c9c65ac57d7c4c46346fc4f0194caa9b45e3f1d1ff8d9b6d7e

    • SHA512

      47aa4b676685ba5d64fbc0c9487545b7769987375f4af64ac05857064f3e9dc4dea576a41878d0e901840fd91a23b04f29f8ea33971b5710f017c8ff54d06b6b

    • SSDEEP

      98304:ADqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2HND527BWG:ADqPe1Cxcxk3ZAEUadzR8yc4HNVQBWG

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3185) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks