General

  • Target

    16c187a08da7d93c325ba823c14d29466671f51eddaa412d553b7f3260e10d43_NeikiAnalytics.exe

  • Size

    305KB

  • Sample

    240625-1xagnswcqd

  • MD5

    a38c73ebcf2b25867b70610d9daf2860

  • SHA1

    8f3c079d148456a689e2e01a7599a781cc60b715

  • SHA256

    16c187a08da7d93c325ba823c14d29466671f51eddaa412d553b7f3260e10d43

  • SHA512

    fa1af6e0d45631f49fe4509a5c90b2b0695be4f4019aca7fb73db7ed9260e799573df16cb22793c2760e87b93f49a0c3a3825ff0f94e0e53f3e97e22237c5dda

  • SSDEEP

    6144:dXC4vgmhbIxs3NBRJlgxdBixHu4xLJF16H7AjmavtvAdtDtmdqtUf+:dXCNi9BTlqdMxxLBsqDvlSDt5Of+

Malware Config

Targets

    • Target

      16c187a08da7d93c325ba823c14d29466671f51eddaa412d553b7f3260e10d43_NeikiAnalytics.exe

    • Size

      305KB

    • MD5

      a38c73ebcf2b25867b70610d9daf2860

    • SHA1

      8f3c079d148456a689e2e01a7599a781cc60b715

    • SHA256

      16c187a08da7d93c325ba823c14d29466671f51eddaa412d553b7f3260e10d43

    • SHA512

      fa1af6e0d45631f49fe4509a5c90b2b0695be4f4019aca7fb73db7ed9260e799573df16cb22793c2760e87b93f49a0c3a3825ff0f94e0e53f3e97e22237c5dda

    • SSDEEP

      6144:dXC4vgmhbIxs3NBRJlgxdBixHu4xLJF16H7AjmavtvAdtDtmdqtUf+:dXCNi9BTlqdMxxLBsqDvlSDt5Of+

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks