General

  • Target

    19e7ea0dc7118dd7462de2aa7ebd699ae7adb315ee42dc6290e4481c6ca94988_NeikiAnalytics.exe

  • Size

    1.4MB

  • Sample

    240625-2amddsxcmd

  • MD5

    013ae3ed975e07e0b9d997396cba0a30

  • SHA1

    488079e2d0840707d52fd9cde73456612c1e57bb

  • SHA256

    19e7ea0dc7118dd7462de2aa7ebd699ae7adb315ee42dc6290e4481c6ca94988

  • SHA512

    f86b7d90a8a357ca72e681ba3861c9bd5f1338efa59c970e5de2b8cd3473d08f84407aed11d16c6e2f2ad243c30b00fac19a513184a384a0eaf39f50661f04d6

  • SSDEEP

    24576:oWFBgq/zHdb1x6Nlyzz30OSRgIQnZXYk1HfUPj+ba+QCIUjaQ0oQ3O79lbm6FxmL:VFBg0p5x6rRnQdXdf6+bDJ0oAO3bFxmL

Malware Config

Targets

    • Target

      19e7ea0dc7118dd7462de2aa7ebd699ae7adb315ee42dc6290e4481c6ca94988_NeikiAnalytics.exe

    • Size

      1.4MB

    • MD5

      013ae3ed975e07e0b9d997396cba0a30

    • SHA1

      488079e2d0840707d52fd9cde73456612c1e57bb

    • SHA256

      19e7ea0dc7118dd7462de2aa7ebd699ae7adb315ee42dc6290e4481c6ca94988

    • SHA512

      f86b7d90a8a357ca72e681ba3861c9bd5f1338efa59c970e5de2b8cd3473d08f84407aed11d16c6e2f2ad243c30b00fac19a513184a384a0eaf39f50661f04d6

    • SSDEEP

      24576:oWFBgq/zHdb1x6Nlyzz30OSRgIQnZXYk1HfUPj+ba+QCIUjaQ0oQ3O79lbm6FxmL:VFBg0p5x6rRnQdXdf6+bDJ0oAO3bFxmL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks