General

  • Target

    2601cc2a8e6ca6c12e53fd337a0e95deebb452d7a14bc8b6c38083766df39548_NeikiAnalytics.exe

  • Size

    835KB

  • Sample

    240627-1q6arsvhpk

  • MD5

    ce336a20daa0c5d9dd74ab11a2b4f140

  • SHA1

    3987776722d8a6f93582fa5a4fd453bb56a8392f

  • SHA256

    2601cc2a8e6ca6c12e53fd337a0e95deebb452d7a14bc8b6c38083766df39548

  • SHA512

    0af36626b8fa3c337d11122df251debf7477c6bf00b6957261b6091ca07c4c37540685fb15d4ab46edd2dae73b96dd2dc7bc1148b5c4d65821c4b2c02fc10af3

  • SSDEEP

    24576:sWTlVgNcil/d0n0B5r9ANtyvBGpCCZKzQHoHyD:BhVaXl/6S5reyWZIEoHA

Malware Config

Targets

    • Target

      2601cc2a8e6ca6c12e53fd337a0e95deebb452d7a14bc8b6c38083766df39548_NeikiAnalytics.exe

    • Size

      835KB

    • MD5

      ce336a20daa0c5d9dd74ab11a2b4f140

    • SHA1

      3987776722d8a6f93582fa5a4fd453bb56a8392f

    • SHA256

      2601cc2a8e6ca6c12e53fd337a0e95deebb452d7a14bc8b6c38083766df39548

    • SHA512

      0af36626b8fa3c337d11122df251debf7477c6bf00b6957261b6091ca07c4c37540685fb15d4ab46edd2dae73b96dd2dc7bc1148b5c4d65821c4b2c02fc10af3

    • SSDEEP

      24576:sWTlVgNcil/d0n0B5r9ANtyvBGpCCZKzQHoHyD:BhVaXl/6S5reyWZIEoHA

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks