General

  • Target

    45357f3ed22c3ff44e2839b42ad043ed1f31ddbeab76e8a1d08dd02be7f48612_NeikiAnalytics.exe

  • Size

    1.6MB

  • Sample

    240627-dz3jxasgpk

  • MD5

    5e76d041c384144eb7f4edd4c9e49b80

  • SHA1

    0fe6914b6a5fffc7f7ec644b8e26994d5a99051a

  • SHA256

    45357f3ed22c3ff44e2839b42ad043ed1f31ddbeab76e8a1d08dd02be7f48612

  • SHA512

    1597d9c8151a6836eb7295f245f51c2bb23c2f5f716e360d483eb2baf35ae7f587f76cb43a187dea1c421215ca5b9950db5f4e6c394f594c41365de9bf9c9723

  • SSDEEP

    24576:CIypCI6cTAMTCKWyrq4gJaZrNBmz3CU5G8BVF2usnc9DBZ8tVnRgaIFgbyqFpu:CIytTmHyca5Ncz3X5DVF2tchmcIyqG

Malware Config

Targets

    • Target

      45357f3ed22c3ff44e2839b42ad043ed1f31ddbeab76e8a1d08dd02be7f48612_NeikiAnalytics.exe

    • Size

      1.6MB

    • MD5

      5e76d041c384144eb7f4edd4c9e49b80

    • SHA1

      0fe6914b6a5fffc7f7ec644b8e26994d5a99051a

    • SHA256

      45357f3ed22c3ff44e2839b42ad043ed1f31ddbeab76e8a1d08dd02be7f48612

    • SHA512

      1597d9c8151a6836eb7295f245f51c2bb23c2f5f716e360d483eb2baf35ae7f587f76cb43a187dea1c421215ca5b9950db5f4e6c394f594c41365de9bf9c9723

    • SSDEEP

      24576:CIypCI6cTAMTCKWyrq4gJaZrNBmz3CU5G8BVF2usnc9DBZ8tVnRgaIFgbyqFpu:CIytTmHyca5Ncz3X5DVF2tchmcIyqG

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks