General

  • Target

    4efadab44ced8b681da93682cd1f546121c78d9494c10c19e519a1a37471562d_NeikiAnalytics.exe

  • Size

    1.4MB

  • Sample

    240701-nrl73azale

  • MD5

    19563ff6a27d12b46f45a6b3465be470

  • SHA1

    61a44edfc4e619cde49502ded3e5ccca6aa02020

  • SHA256

    4efadab44ced8b681da93682cd1f546121c78d9494c10c19e519a1a37471562d

  • SHA512

    d897185fdf396074efcbc1a2d69aa772a5ea23c1123f89fb37356208370b3c2b237b26560c245a02724388235aaf03ea69d3964187aa032674cf0bad96abf1d5

  • SSDEEP

    24576:CL+ZsQbIDYkPifbxU3qBlO2SE7yZCPYpkRUOntFEfe5QDzQKw1aOdky2ZpojY3vl:CLkBbj/xuqBXSEOEP3Rzz5asnQWQkjeN

Malware Config

Targets

    • Target

      4efadab44ced8b681da93682cd1f546121c78d9494c10c19e519a1a37471562d_NeikiAnalytics.exe

    • Size

      1.4MB

    • MD5

      19563ff6a27d12b46f45a6b3465be470

    • SHA1

      61a44edfc4e619cde49502ded3e5ccca6aa02020

    • SHA256

      4efadab44ced8b681da93682cd1f546121c78d9494c10c19e519a1a37471562d

    • SHA512

      d897185fdf396074efcbc1a2d69aa772a5ea23c1123f89fb37356208370b3c2b237b26560c245a02724388235aaf03ea69d3964187aa032674cf0bad96abf1d5

    • SSDEEP

      24576:CL+ZsQbIDYkPifbxU3qBlO2SE7yZCPYpkRUOntFEfe5QDzQKw1aOdky2ZpojY3vl:CLkBbj/xuqBXSEOEP3Rzz5asnQWQkjeN

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks