General

  • Target

    0ea46663782208fb0926e6bd8b6f2fe0a8c3b1b0c38072dba1b4c370cf3cea32_NeikiAnalytics.exe

  • Size

    2.1MB

  • Sample

    240627-x9nchsygpn

  • MD5

    3c2157d58459ecf3fd177b13f28a0350

  • SHA1

    420591e8094be60fbe52e918a5f6fbd85804b85a

  • SHA256

    0ea46663782208fb0926e6bd8b6f2fe0a8c3b1b0c38072dba1b4c370cf3cea32

  • SHA512

    5dba105e428ccebe92ff05c634a485c029f3d773f7be151021086e4bdb68df0cedd99c229e884d7a3d966c24e457de4db7a4df712b07ff21e74d235c48141c99

  • SSDEEP

    49152:CCocUruXjPtM/+4ov9bybmBkp96cwF4T3QwGKt5/Yn:6truXjK3o12bckp96cZTAwGc5U

Malware Config

Targets

    • Target

      0ea46663782208fb0926e6bd8b6f2fe0a8c3b1b0c38072dba1b4c370cf3cea32_NeikiAnalytics.exe

    • Size

      2.1MB

    • MD5

      3c2157d58459ecf3fd177b13f28a0350

    • SHA1

      420591e8094be60fbe52e918a5f6fbd85804b85a

    • SHA256

      0ea46663782208fb0926e6bd8b6f2fe0a8c3b1b0c38072dba1b4c370cf3cea32

    • SHA512

      5dba105e428ccebe92ff05c634a485c029f3d773f7be151021086e4bdb68df0cedd99c229e884d7a3d966c24e457de4db7a4df712b07ff21e74d235c48141c99

    • SSDEEP

      49152:CCocUruXjPtM/+4ov9bybmBkp96cwF4T3QwGKt5/Yn:6truXjK3o12bckp96cZTAwGc5U

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks