General

  • Target

    625fe082bf20819e49750456c8c91af7ae23a2680df9b5004b182fea3a0dbd63_NeikiAnalytics.exe

  • Size

    224KB

  • Sample

    240625-p4a61a1brd

  • MD5

    293a6d929e30cf553da67f54ed3a9c90

  • SHA1

    55d487011b784dee954e53df230f9017bfb12825

  • SHA256

    625fe082bf20819e49750456c8c91af7ae23a2680df9b5004b182fea3a0dbd63

  • SHA512

    639fd1ec7e0880959cf18fb62139a80cc780cefbf0ae437282d165999ccfeabeb5ad38f9806bc15884843bbed4cca0128343677398cf8e5844cd9f92e7fd16e7

  • SSDEEP

    6144:oIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZy:xKofHfHTXQLzgvnzHPowYbvrjD/L7QPo

Malware Config

Targets

    • Target

      625fe082bf20819e49750456c8c91af7ae23a2680df9b5004b182fea3a0dbd63_NeikiAnalytics.exe

    • Size

      224KB

    • MD5

      293a6d929e30cf553da67f54ed3a9c90

    • SHA1

      55d487011b784dee954e53df230f9017bfb12825

    • SHA256

      625fe082bf20819e49750456c8c91af7ae23a2680df9b5004b182fea3a0dbd63

    • SHA512

      639fd1ec7e0880959cf18fb62139a80cc780cefbf0ae437282d165999ccfeabeb5ad38f9806bc15884843bbed4cca0128343677398cf8e5844cd9f92e7fd16e7

    • SSDEEP

      6144:oIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZy:xKofHfHTXQLzgvnzHPowYbvrjD/L7QPo

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks