General

  • Target

    67c6f60c7103e359f782650819bb42abd21faf0179214bc13194166248494b45_NeikiAnalytics.exe

  • Size

    1.1MB

  • Sample

    240620-qpca7azdld

  • MD5

    6fe3ce390f1edf64032ad838bc39bda0

  • SHA1

    b62a449537a71eadadb9c561172fd9552a5f370f

  • SHA256

    67c6f60c7103e359f782650819bb42abd21faf0179214bc13194166248494b45

  • SHA512

    a8b90e7d9a1e4c646c9ec3affe7f78eeae08924114836465f6f8d29a9c94a5879b4e2ba6960f08d560533102cfc169441bb1bb4446d94df4ba13bc77348f4033

  • SSDEEP

    12288:puKXlB8FBeASZmi78Jk5HWVFeq9J8ng/0paQuj30s9fdD02fKBjtp/TEboaOvklG:pK2Zmi78Jk52qw860GejrbeCQe/

Malware Config

Targets

    • Target

      67c6f60c7103e359f782650819bb42abd21faf0179214bc13194166248494b45_NeikiAnalytics.exe

    • Size

      1.1MB

    • MD5

      6fe3ce390f1edf64032ad838bc39bda0

    • SHA1

      b62a449537a71eadadb9c561172fd9552a5f370f

    • SHA256

      67c6f60c7103e359f782650819bb42abd21faf0179214bc13194166248494b45

    • SHA512

      a8b90e7d9a1e4c646c9ec3affe7f78eeae08924114836465f6f8d29a9c94a5879b4e2ba6960f08d560533102cfc169441bb1bb4446d94df4ba13bc77348f4033

    • SSDEEP

      12288:puKXlB8FBeASZmi78Jk5HWVFeq9J8ng/0paQuj30s9fdD02fKBjtp/TEboaOvklG:pK2Zmi78Jk52qw860GejrbeCQe/

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Renames multiple (10363) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks