General

  • Target

    8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe

  • Size

    4.0MB

  • Sample

    240624-tjcljs1bkd

  • MD5

    7bfd20db106b80d913739d6cec3e8e20

  • SHA1

    e190085bbcfaf96228a58e4c19c210b9a2672afb

  • SHA256

    8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc

  • SHA512

    143d4080d835fd3672241c51af2e458f0f329cd64d477be690bd054c2967e7f57a0c477b8ea73ca29f5766eeea66f103d51c25b8f84cf1a758fc1f41cdd9a287

  • SSDEEP

    49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBIB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpjbVz8eLFcz

Malware Config

Targets

    • Target

      8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc_NeikiAnalytics.exe

    • Size

      4.0MB

    • MD5

      7bfd20db106b80d913739d6cec3e8e20

    • SHA1

      e190085bbcfaf96228a58e4c19c210b9a2672afb

    • SHA256

      8c7fa8d0100aea0ad0acd06d87c850b04b4c577e6eeb24ae9bfd16b108f58bcc

    • SHA512

      143d4080d835fd3672241c51af2e458f0f329cd64d477be690bd054c2967e7f57a0c477b8ea73ca29f5766eeea66f103d51c25b8f84cf1a758fc1f41cdd9a287

    • SSDEEP

      49152:sxX7665YxRVplZzSKntlGIiT+HvRdpcAHSjpjK3LBIB/bSqz8b6LNXJqI20t:sxX7QnxrloE5dpUpjbVz8eLFcz

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks