General

  • Target

    2ef4464a75514e6ba7439a49fa1eb3208c48b5df59c7798d9c342c54ace58c6e_NeikiAnalytics.exe

  • Size

    352KB

  • Sample

    240626-a6xepatgpf

  • MD5

    2235edcee36b3e7edb211423a533cb60

  • SHA1

    e632aa75d6276c8c267e854aad2d9c915da58966

  • SHA256

    2ef4464a75514e6ba7439a49fa1eb3208c48b5df59c7798d9c342c54ace58c6e

  • SHA512

    b0f99291de1dd42363415023da579ac280a17f92bda7dc42036d09c55fe6621a63af800c11ae85fd64bb77d5933a662ed080a6e13ca8a237cc9607cdaf99d9aa

  • SSDEEP

    6144:zIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:WKofHfHTXQLzgvnzHPowYbvrjD/L7QPs

Malware Config

Targets

    • Target

      2ef4464a75514e6ba7439a49fa1eb3208c48b5df59c7798d9c342c54ace58c6e_NeikiAnalytics.exe

    • Size

      352KB

    • MD5

      2235edcee36b3e7edb211423a533cb60

    • SHA1

      e632aa75d6276c8c267e854aad2d9c915da58966

    • SHA256

      2ef4464a75514e6ba7439a49fa1eb3208c48b5df59c7798d9c342c54ace58c6e

    • SHA512

      b0f99291de1dd42363415023da579ac280a17f92bda7dc42036d09c55fe6621a63af800c11ae85fd64bb77d5933a662ed080a6e13ca8a237cc9607cdaf99d9aa

    • SSDEEP

      6144:zIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:WKofHfHTXQLzgvnzHPowYbvrjD/L7QPs

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks