General

  • Target

    3de888331102e0b12f3eecda7682e8784911d6d22e4719db14357ad6e0a7df5e_NeikiAnalytics.exe

  • Size

    1.5MB

  • Sample

    240701-hrwtlssbmj

  • MD5

    1d699880ff4635776520b1b27267ae60

  • SHA1

    3d398be157d6c40aca523a0394ce7923247d03d9

  • SHA256

    3de888331102e0b12f3eecda7682e8784911d6d22e4719db14357ad6e0a7df5e

  • SHA512

    8389753e4a7d2b24556c921f1e60daebfb90159935d19fc4bfedb0ab0aac9a676d54a22dab5b2e00b6212e235f73031d8a5113455d803b36b970ac2c64394498

  • SSDEEP

    24576:2w0tr1lUyCJjcWyT5cvfuL685Y3xnk1m/EVH8NN1CnqhW4663x5lo8GWuiovnhqM:h0txTqv2W+Y3iVH0bCnaWmLcvhqFZg

Malware Config

Targets

    • Target

      3de888331102e0b12f3eecda7682e8784911d6d22e4719db14357ad6e0a7df5e_NeikiAnalytics.exe

    • Size

      1.5MB

    • MD5

      1d699880ff4635776520b1b27267ae60

    • SHA1

      3d398be157d6c40aca523a0394ce7923247d03d9

    • SHA256

      3de888331102e0b12f3eecda7682e8784911d6d22e4719db14357ad6e0a7df5e

    • SHA512

      8389753e4a7d2b24556c921f1e60daebfb90159935d19fc4bfedb0ab0aac9a676d54a22dab5b2e00b6212e235f73031d8a5113455d803b36b970ac2c64394498

    • SSDEEP

      24576:2w0tr1lUyCJjcWyT5cvfuL685Y3xnk1m/EVH8NN1CnqhW4663x5lo8GWuiovnhqM:h0txTqv2W+Y3iVH0bCnaWmLcvhqFZg

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks