General

  • Target

    51685da80c82c17769a8875ed72ceba8023feb8cba099162b39437e4a0ebc459_NeikiAnalytics.exe

  • Size

    1.1MB

  • Sample

    240620-ln2r8s1apd

  • MD5

    b63892272e90adf45d556c65631379d0

  • SHA1

    f32875eb769368560a1badb56cac4ef2faedffd1

  • SHA256

    51685da80c82c17769a8875ed72ceba8023feb8cba099162b39437e4a0ebc459

  • SHA512

    2239d570b556b9552bb2e7a87d41398797665d6f9668668f6b300f524ca84d6b0ec7a9cfe87f04a053003f3438b5a77b775f9513019a58a3fd3e1b4394ade504

  • SSDEEP

    12288:5IKV170p4D/Cmi78Rk8HnCXj/9lBQg/0paQuj3Ps9mdD02fKBjtp/EZtAORTSWh:jTrCmi78Rk8HiBx0GKjryAjc

Malware Config

Targets

    • Target

      51685da80c82c17769a8875ed72ceba8023feb8cba099162b39437e4a0ebc459_NeikiAnalytics.exe

    • Size

      1.1MB

    • MD5

      b63892272e90adf45d556c65631379d0

    • SHA1

      f32875eb769368560a1badb56cac4ef2faedffd1

    • SHA256

      51685da80c82c17769a8875ed72ceba8023feb8cba099162b39437e4a0ebc459

    • SHA512

      2239d570b556b9552bb2e7a87d41398797665d6f9668668f6b300f524ca84d6b0ec7a9cfe87f04a053003f3438b5a77b775f9513019a58a3fd3e1b4394ade504

    • SSDEEP

      12288:5IKV170p4D/Cmi78Rk8HnCXj/9lBQg/0paQuj3Ps9mdD02fKBjtp/EZtAORTSWh:jTrCmi78Rk8HiBx0GKjryAjc

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Renames multiple (10350) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks