General

  • Target

    1ee786d92d4527fd9f30ad20edc75734d96d9aa27138eddaf2ab20d2fbb2b99d_NeikiAnalytics.exe

  • Size

    387KB

  • Sample

    240630-2b4n3a1bpp

  • MD5

    5458286299f771ed154e683e84780ca0

  • SHA1

    bd6744199500101d1a4eae05e10bf5a4a3ba5bcb

  • SHA256

    1ee786d92d4527fd9f30ad20edc75734d96d9aa27138eddaf2ab20d2fbb2b99d

  • SHA512

    6b85f7b2e9b5049068af34ef916976008e6bada5325e4747bbd2f5b5bc4ebd47f19eca7ab3bf07b2475e5961be28b97f1108b6ca776cbdbce9a795ea7e6cd70f

  • SSDEEP

    6144:dXC4vgmhbIxs3NBREEk4RvNCMeSng3QMQuKmnsV87ibPLFjDG3k4vXsjWbTO:dXCNi9BaEzHw3XMM2wupCvXHvO

Malware Config

Targets

    • Target

      1ee786d92d4527fd9f30ad20edc75734d96d9aa27138eddaf2ab20d2fbb2b99d_NeikiAnalytics.exe

    • Size

      387KB

    • MD5

      5458286299f771ed154e683e84780ca0

    • SHA1

      bd6744199500101d1a4eae05e10bf5a4a3ba5bcb

    • SHA256

      1ee786d92d4527fd9f30ad20edc75734d96d9aa27138eddaf2ab20d2fbb2b99d

    • SHA512

      6b85f7b2e9b5049068af34ef916976008e6bada5325e4747bbd2f5b5bc4ebd47f19eca7ab3bf07b2475e5961be28b97f1108b6ca776cbdbce9a795ea7e6cd70f

    • SSDEEP

      6144:dXC4vgmhbIxs3NBREEk4RvNCMeSng3QMQuKmnsV87ibPLFjDG3k4vXsjWbTO:dXCNi9BaEzHw3XMM2wupCvXHvO

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks