General
-
Target
4d9cf0e60b2fe13cc8f5dd36e1b0e771d6b6e001e5f95c5a3dede78cdcdbd01c_NeikiAnalytics.exe
-
Size
577KB
-
Sample
240701-nc3w9syckf
-
MD5
f9330a18b7aee16a7f167d0d0a8f4a60
-
SHA1
1341533d0f67aa8866d141028310a374e257e7e2
-
SHA256
4d9cf0e60b2fe13cc8f5dd36e1b0e771d6b6e001e5f95c5a3dede78cdcdbd01c
-
SHA512
8141da7a5d651dfae69879adba492e9b0bff4406b8e233d5c468ace1a700d248f16bb6697b703c124957829b0b8e3cb64bf89714c422a63ecfc9516136aebdff
-
SSDEEP
6144:k9hBWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJUCX:IPw2PjCLe3a6Q70zbYow60u
Behavioral task
behavioral1
Sample
4d9cf0e60b2fe13cc8f5dd36e1b0e771d6b6e001e5f95c5a3dede78cdcdbd01c_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4d9cf0e60b2fe13cc8f5dd36e1b0e771d6b6e001e5f95c5a3dede78cdcdbd01c_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
predatorstealer
http://ghostghostcom.000webhostapp.com/
Targets
-
-
Target
4d9cf0e60b2fe13cc8f5dd36e1b0e771d6b6e001e5f95c5a3dede78cdcdbd01c_NeikiAnalytics.exe
-
Size
577KB
-
MD5
f9330a18b7aee16a7f167d0d0a8f4a60
-
SHA1
1341533d0f67aa8866d141028310a374e257e7e2
-
SHA256
4d9cf0e60b2fe13cc8f5dd36e1b0e771d6b6e001e5f95c5a3dede78cdcdbd01c
-
SHA512
8141da7a5d651dfae69879adba492e9b0bff4406b8e233d5c468ace1a700d248f16bb6697b703c124957829b0b8e3cb64bf89714c422a63ecfc9516136aebdff
-
SSDEEP
6144:k9hBWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJUCX:IPw2PjCLe3a6Q70zbYow60u
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1