General

  • Target

    3dd40cca786c621b9883bad5ea44257468dba3b2892d78190a09c72c51f38304_NeikiAnalytics.exe

  • Size

    613KB

  • Sample

    240702-gpyprayhrb

  • MD5

    caff8650fca4a33d6f45b68b5450b210

  • SHA1

    7a35c8cbfca8cf6ed70c5368eaf4a3ab1e5a2e2f

  • SHA256

    3dd40cca786c621b9883bad5ea44257468dba3b2892d78190a09c72c51f38304

  • SHA512

    cc9fb18b27efd3361847cc6b4ac31f65395124e69ce331f1aed8cbcec6d04ad860b93a6f5a54268642ca1519099eb6a22b8dd55a78c8ad7e194df2dfc83cc626

  • SSDEEP

    12288:pyjOIcdC2jZ8Fj1tNzyGgUWmms8Zb60v5cvZ2KNBIpKl2DSWAYZ4Vv3ce4:pyj3cP+Fjr5ZGJbIh2KNBIXDSFYy9cr

Malware Config

Extracted

Family

predatorstealer

C2

http://ghostghostcom.000webhostapp.com/

Targets

    • Target

      3dd40cca786c621b9883bad5ea44257468dba3b2892d78190a09c72c51f38304_NeikiAnalytics.exe

    • Size

      613KB

    • MD5

      caff8650fca4a33d6f45b68b5450b210

    • SHA1

      7a35c8cbfca8cf6ed70c5368eaf4a3ab1e5a2e2f

    • SHA256

      3dd40cca786c621b9883bad5ea44257468dba3b2892d78190a09c72c51f38304

    • SHA512

      cc9fb18b27efd3361847cc6b4ac31f65395124e69ce331f1aed8cbcec6d04ad860b93a6f5a54268642ca1519099eb6a22b8dd55a78c8ad7e194df2dfc83cc626

    • SSDEEP

      12288:pyjOIcdC2jZ8Fj1tNzyGgUWmms8Zb60v5cvZ2KNBIpKl2DSWAYZ4Vv3ce4:pyj3cP+Fjr5ZGJbIh2KNBIXDSFYy9cr

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • PredatorStealer

      Predator is a modular stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      Darkminer v6.exe

    • Size

      188KB

    • MD5

      82aed2b114642857da21b46ad83fcf21

    • SHA1

      13a6fed33398ebdc352b0b9d62d77c5575cd864e

    • SHA256

      3603803a35881bf623d136b2288fdc68164c351251c2da50c295135264a0e2ab

    • SHA512

      3418491bfca42a4aa1fa52768783b89da67363141992013d4461398c0a7ff44e2822dca60da8d2ebb7c55e82f8d3517c644704b568423ccd20e93e3a1bb6dce3

    • SSDEEP

      3072:sr85CvxacPEMk6/RQAFTWfW8Yj8vbzyQ6Y1YXrbNK+3FX:k9P7RQeTWu8qszAXNK+3FX

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Target

      server.vbe

    • Size

      1.1MB

    • MD5

      44fb327da402e69994ffac915d1d555c

    • SHA1

      0edfb246b38b2f485ace4b7ea3da444080b486c3

    • SHA256

      30df4612deed312396df9a87b4b1b1c777f4e3fa3d7defebd7947586b7d43806

    • SHA512

      03ac6b1c9a13757e75aab121266eee8a92e0e117c0719a0008a433cb6afa7704f3f0006508f78966bca485958df9cea3e7d9ec4e6230cc9e9a036ac6ccd08727

    • SSDEEP

      24576:xMydSNpU0/rrHAcvg+jiEPBrD5JQo3xF8srpIUTC:xNEZB/C

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • PredatorStealer

      Predator is a modular stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks