General

  • Target

    4f88dbae459d94b81693f4dc865495a12ae3afee6c6341892b391aea092d87fe_NeikiAnalytics.exe

  • Size

    1.8MB

  • Sample

    240627-fhqj5atapc

  • MD5

    1996120726ac6a9b4d5337ae5ba8fbc0

  • SHA1

    73ef998470b1960d4d38df47f865c776e36d1884

  • SHA256

    4f88dbae459d94b81693f4dc865495a12ae3afee6c6341892b391aea092d87fe

  • SHA512

    4bf84d167d3b9a8794d9755755a72c9af94b5c1b1e9f44e746204c50f38cf3dc5d1aa3005432dcb4d17e1e5235c9ead5ca5700be9d8822376b5231bc43d62502

  • SSDEEP

    49152:VwRI7XFHYYWC9ezsUEErJnPlBVzx7J7l1NU:aRI7XXIoUTPlBVzppl1NU

Malware Config

Targets

    • Target

      4f88dbae459d94b81693f4dc865495a12ae3afee6c6341892b391aea092d87fe_NeikiAnalytics.exe

    • Size

      1.8MB

    • MD5

      1996120726ac6a9b4d5337ae5ba8fbc0

    • SHA1

      73ef998470b1960d4d38df47f865c776e36d1884

    • SHA256

      4f88dbae459d94b81693f4dc865495a12ae3afee6c6341892b391aea092d87fe

    • SHA512

      4bf84d167d3b9a8794d9755755a72c9af94b5c1b1e9f44e746204c50f38cf3dc5d1aa3005432dcb4d17e1e5235c9ead5ca5700be9d8822376b5231bc43d62502

    • SSDEEP

      49152:VwRI7XFHYYWC9ezsUEErJnPlBVzx7J7l1NU:aRI7XXIoUTPlBVzppl1NU

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks