General

  • Target

    303de0137c6b9b4a622aceb8df5941eee9d9452d6b462c04a96c94df5604f590_NeikiAnalytics.exe

  • Size

    457KB

  • Sample

    240620-eara1s1fkl

  • MD5

    3f54fcb2e35887f401e81738c12a0cd0

  • SHA1

    3665ca71071f6bc265fcafaa8240f7f028f9598b

  • SHA256

    303de0137c6b9b4a622aceb8df5941eee9d9452d6b462c04a96c94df5604f590

  • SHA512

    1c51d9accb412ca4016c3e5b48c61394d65c3e917331875372ad0a79b6dddc18e770330c31c87b29a2aa79bd33d8ccd807e4d950caaa662615a89dc17cbfdf8d

  • SSDEEP

    6144:dXC4vgmhbIxs3NBB5QdM2PWvxGKiHHW9dZLVRT4pUy/mQdL2KVovSgv+Z0Nkj9wU:dXCNi9BfrvkHcdR+/Hvqbvi9V

Malware Config

Targets

    • Target

      303de0137c6b9b4a622aceb8df5941eee9d9452d6b462c04a96c94df5604f590_NeikiAnalytics.exe

    • Size

      457KB

    • MD5

      3f54fcb2e35887f401e81738c12a0cd0

    • SHA1

      3665ca71071f6bc265fcafaa8240f7f028f9598b

    • SHA256

      303de0137c6b9b4a622aceb8df5941eee9d9452d6b462c04a96c94df5604f590

    • SHA512

      1c51d9accb412ca4016c3e5b48c61394d65c3e917331875372ad0a79b6dddc18e770330c31c87b29a2aa79bd33d8ccd807e4d950caaa662615a89dc17cbfdf8d

    • SSDEEP

      6144:dXC4vgmhbIxs3NBB5QdM2PWvxGKiHHW9dZLVRT4pUy/mQdL2KVovSgv+Z0Nkj9wU:dXCNi9BfrvkHcdR+/Hvqbvi9V

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks