General

  • Target

    85b80906130c64a25880df61ca2bb9aae82e99b4328d20a38d854b3ec82b1601_NeikiAnalytics.exe

  • Size

    1.7MB

  • Sample

    240627-pzs61svarn

  • MD5

    89f32f51f903ec75b5ea7a4af1f5d270

  • SHA1

    99ca4b16fb4b39ace8f37690565a4a98afc15b53

  • SHA256

    85b80906130c64a25880df61ca2bb9aae82e99b4328d20a38d854b3ec82b1601

  • SHA512

    748e06d6cb1fdf0fee533d26a5e62cd8a3d98a4c1e10c6d155fae18ad4314cf704a1cc2c806dcf79cf5911af2d032b189df44fadeaf550071a9236b9f846b704

  • SSDEEP

    49152:CgFZ4lKB7474iAUR2tYXTxT5DMcGkFKJhIHwDLM:F4lKN47FA6UYF5D1LFK0HwLM

Malware Config

Targets

    • Target

      85b80906130c64a25880df61ca2bb9aae82e99b4328d20a38d854b3ec82b1601_NeikiAnalytics.exe

    • Size

      1.7MB

    • MD5

      89f32f51f903ec75b5ea7a4af1f5d270

    • SHA1

      99ca4b16fb4b39ace8f37690565a4a98afc15b53

    • SHA256

      85b80906130c64a25880df61ca2bb9aae82e99b4328d20a38d854b3ec82b1601

    • SHA512

      748e06d6cb1fdf0fee533d26a5e62cd8a3d98a4c1e10c6d155fae18ad4314cf704a1cc2c806dcf79cf5911af2d032b189df44fadeaf550071a9236b9f846b704

    • SSDEEP

      49152:CgFZ4lKB7474iAUR2tYXTxT5DMcGkFKJhIHwDLM:F4lKN47FA6UYF5D1LFK0HwLM

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks