General

  • Target

    8932363dfe149d9e1c3db828bb4abd201e5a2448edc09c9dfb2f795134e7b5e2_NeikiAnalytics.exe

  • Size

    1.6MB

  • Sample

    240628-gzbyqsxfnn

  • MD5

    b66e49c15fffaf28b36bad0d2f2d41d0

  • SHA1

    13152b0724633be2d24949fa73505ae6c7d8159e

  • SHA256

    8932363dfe149d9e1c3db828bb4abd201e5a2448edc09c9dfb2f795134e7b5e2

  • SHA512

    eecc573dcc5101002065db717259fa4c80a9705e104742cc14c7e830e08785b6efb8e3c1c6df65a15473256ef263b0086fae6f766ae5b0fc0032c768dab7ca7b

  • SSDEEP

    24576:Q0lo34go9ufHovpBw/5R+1roUF6mquEc23Q4HdeoY5DWmtxjE3q/xdpw5azMrpj8:QYy3UuvcpBJp6+EL9/YvSqnuUzq1iUKx

Malware Config

Targets

    • Target

      8932363dfe149d9e1c3db828bb4abd201e5a2448edc09c9dfb2f795134e7b5e2_NeikiAnalytics.exe

    • Size

      1.6MB

    • MD5

      b66e49c15fffaf28b36bad0d2f2d41d0

    • SHA1

      13152b0724633be2d24949fa73505ae6c7d8159e

    • SHA256

      8932363dfe149d9e1c3db828bb4abd201e5a2448edc09c9dfb2f795134e7b5e2

    • SHA512

      eecc573dcc5101002065db717259fa4c80a9705e104742cc14c7e830e08785b6efb8e3c1c6df65a15473256ef263b0086fae6f766ae5b0fc0032c768dab7ca7b

    • SSDEEP

      24576:Q0lo34go9ufHovpBw/5R+1roUF6mquEc23Q4HdeoY5DWmtxjE3q/xdpw5azMrpj8:QYy3UuvcpBJp6+EL9/YvSqnuUzq1iUKx

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks