General

  • Target

    34452be95417f0cb94a40528ab2dfe4a0cc361cc4d30d248390504881b8c58bb_NeikiAnalytics.exe

  • Size

    1.7MB

  • Sample

    240628-3tptasydnl

  • MD5

    cde7958deb330e8e65dab1171173c010

  • SHA1

    e0d752cd92f6456e212eab2509567c9bb33053dc

  • SHA256

    34452be95417f0cb94a40528ab2dfe4a0cc361cc4d30d248390504881b8c58bb

  • SHA512

    63ef7df78fe9c42d781d246842ff1f07bd95fe59669a832d42f869f234a46923fd8600e6e2f23bc35278d8dfea1611ec9b3dbd55b4a185907beb75da6030590f

  • SSDEEP

    24576:oWXrH7rQaG1MPWdvfAyABcA3R7xKBxzd2NAcDyGHGPnq+OyNK4LErt/7+owxM/7o:V0c4YyAGAhgp2vyBPnqo4/9eMVqntwgd

Malware Config

Targets

    • Target

      34452be95417f0cb94a40528ab2dfe4a0cc361cc4d30d248390504881b8c58bb_NeikiAnalytics.exe

    • Size

      1.7MB

    • MD5

      cde7958deb330e8e65dab1171173c010

    • SHA1

      e0d752cd92f6456e212eab2509567c9bb33053dc

    • SHA256

      34452be95417f0cb94a40528ab2dfe4a0cc361cc4d30d248390504881b8c58bb

    • SHA512

      63ef7df78fe9c42d781d246842ff1f07bd95fe59669a832d42f869f234a46923fd8600e6e2f23bc35278d8dfea1611ec9b3dbd55b4a185907beb75da6030590f

    • SSDEEP

      24576:oWXrH7rQaG1MPWdvfAyABcA3R7xKBxzd2NAcDyGHGPnq+OyNK4LErt/7+owxM/7o:V0c4YyAGAhgp2vyBPnqo4/9eMVqntwgd

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks