General

  • Target

    2d4dd874bf995e2e3a0f65ef4d68cede7dc2aaae6a811b5f8cad6b52b97065f3_NeikiAnalytics.exe

  • Size

    2.0MB

  • Sample

    240701-cgsrbasgmb

  • MD5

    79a69b41a7685d204f093d9cb1be35a0

  • SHA1

    8d233c0276866c70079754c0e6bd75deafc3a38c

  • SHA256

    2d4dd874bf995e2e3a0f65ef4d68cede7dc2aaae6a811b5f8cad6b52b97065f3

  • SHA512

    f50ff7d8f237f0c389a143132208839ddb1bb5310bdd973c476763cb3e059923c4882124730b84455ebeea236bffff8a83243e3b884ce623c37efcd0b605d01c

  • SSDEEP

    49152:VREPfqKU4vzP2We5y/sZcGqXhUUIrIpJjXO/fO4laf+e1hpE1:/EaKU4vzuWqfZ7lUIMhef8fD1+

Malware Config

Targets

    • Target

      2d4dd874bf995e2e3a0f65ef4d68cede7dc2aaae6a811b5f8cad6b52b97065f3_NeikiAnalytics.exe

    • Size

      2.0MB

    • MD5

      79a69b41a7685d204f093d9cb1be35a0

    • SHA1

      8d233c0276866c70079754c0e6bd75deafc3a38c

    • SHA256

      2d4dd874bf995e2e3a0f65ef4d68cede7dc2aaae6a811b5f8cad6b52b97065f3

    • SHA512

      f50ff7d8f237f0c389a143132208839ddb1bb5310bdd973c476763cb3e059923c4882124730b84455ebeea236bffff8a83243e3b884ce623c37efcd0b605d01c

    • SSDEEP

      49152:VREPfqKU4vzP2We5y/sZcGqXhUUIrIpJjXO/fO4laf+e1hpE1:/EaKU4vzuWqfZ7lUIMhef8fD1+

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks