General

  • Target

    6758b8c285d897ab9aab73a4335b68860dc56ddfcde37ff7a6cd6c2c56e8bd4e_NeikiAnalytics.exe

  • Size

    663KB

  • Sample

    240620-qlft7steql

  • MD5

    899ae4892b11e0cd83805e0fa7ce7db0

  • SHA1

    a1afa66af5ae1044e9565eaf850622fbe705c983

  • SHA256

    6758b8c285d897ab9aab73a4335b68860dc56ddfcde37ff7a6cd6c2c56e8bd4e

  • SHA512

    3f5d25c4c6f7dec9e705d4fef32c719df13db507053f5771de104736b4301a699a50d8b70f23b2059533b1fcf0cdcdc6df5741cfb2d8f4cc12af6b42066392c7

  • SSDEEP

    12288:dXCNi9BPf3lRVU7ZDmrZp4OfLlaCSgeJs58tTVH3WPZYIXJGzwjPg:oWPdR67ZirZ2OfZaCSgWs58tTVGiIJGD

Malware Config

Targets

    • Target

      6758b8c285d897ab9aab73a4335b68860dc56ddfcde37ff7a6cd6c2c56e8bd4e_NeikiAnalytics.exe

    • Size

      663KB

    • MD5

      899ae4892b11e0cd83805e0fa7ce7db0

    • SHA1

      a1afa66af5ae1044e9565eaf850622fbe705c983

    • SHA256

      6758b8c285d897ab9aab73a4335b68860dc56ddfcde37ff7a6cd6c2c56e8bd4e

    • SHA512

      3f5d25c4c6f7dec9e705d4fef32c719df13db507053f5771de104736b4301a699a50d8b70f23b2059533b1fcf0cdcdc6df5741cfb2d8f4cc12af6b42066392c7

    • SSDEEP

      12288:dXCNi9BPf3lRVU7ZDmrZp4OfLlaCSgeJs58tTVH3WPZYIXJGzwjPg:oWPdR67ZirZ2OfZaCSgWs58tTVGiIJGD

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks