General

  • Target

    4508d7752aba25b3700109b940011b6e4960c93f93fd9d5e0fc38887a85d21ae_NeikiAnalytics.exe

  • Size

    4.1MB

  • Sample

    240625-jzcw5sxhpb

  • MD5

    3d7e8ce6c9cecc7c1fc1ae8f80a38130

  • SHA1

    429a63e3862257aef485fd091bdcfb4abe58a46a

  • SHA256

    4508d7752aba25b3700109b940011b6e4960c93f93fd9d5e0fc38887a85d21ae

  • SHA512

    2b8a4e7cfc8d4bf3cf651ce609a108a62b512e25ee4ad43b4e5eda348c0ad7d1e016bbea49ca88c979e5d2f67bd30c031c29d36ea8606e2061b4f80085738fd6

  • SSDEEP

    98304:+R0pI/IQlUoMPdmpSpH4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmk5n9klRKN41v

Malware Config

Targets

    • Target

      4508d7752aba25b3700109b940011b6e4960c93f93fd9d5e0fc38887a85d21ae_NeikiAnalytics.exe

    • Size

      4.1MB

    • MD5

      3d7e8ce6c9cecc7c1fc1ae8f80a38130

    • SHA1

      429a63e3862257aef485fd091bdcfb4abe58a46a

    • SHA256

      4508d7752aba25b3700109b940011b6e4960c93f93fd9d5e0fc38887a85d21ae

    • SHA512

      2b8a4e7cfc8d4bf3cf651ce609a108a62b512e25ee4ad43b4e5eda348c0ad7d1e016bbea49ca88c979e5d2f67bd30c031c29d36ea8606e2061b4f80085738fd6

    • SSDEEP

      98304:+R0pI/IQlUoMPdmpSpH4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmk5n9klRKN41v

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks