General

  • Target

    4e8fd18363c81775a037f8549c4280b7676277149d0532e1dd9750fc4d2b47b5_NeikiAnalytics.exe

  • Size

    1.6MB

  • Sample

    240629-cv5ysssbqk

  • MD5

    5cb84315084f9645923bb3ef8f2338e0

  • SHA1

    a13ee818aff9f64b3ee38d0b977d64d1ae678857

  • SHA256

    4e8fd18363c81775a037f8549c4280b7676277149d0532e1dd9750fc4d2b47b5

  • SHA512

    a2a7968a618b77da474d214ec75a55133f6781e84b98149ab8e56c17a2e28e4a5cc07bf121cd90d96a93decfda8fe66347da9b05d9ef35bc360c302254585e5c

  • SSDEEP

    49152:nafZ8co+MwdIsLotILKX2gf0/Wt5/U/qA+EUu:mP53dI+oGG0Wt6bH1

Malware Config

Targets

    • Target

      4e8fd18363c81775a037f8549c4280b7676277149d0532e1dd9750fc4d2b47b5_NeikiAnalytics.exe

    • Size

      1.6MB

    • MD5

      5cb84315084f9645923bb3ef8f2338e0

    • SHA1

      a13ee818aff9f64b3ee38d0b977d64d1ae678857

    • SHA256

      4e8fd18363c81775a037f8549c4280b7676277149d0532e1dd9750fc4d2b47b5

    • SHA512

      a2a7968a618b77da474d214ec75a55133f6781e84b98149ab8e56c17a2e28e4a5cc07bf121cd90d96a93decfda8fe66347da9b05d9ef35bc360c302254585e5c

    • SSDEEP

      49152:nafZ8co+MwdIsLotILKX2gf0/Wt5/U/qA+EUu:mP53dI+oGG0Wt6bH1

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks