General

  • Target

    2ee8c58eefd2d3689f0523219c43e754121b268eb61d37bb8d0eea3b3c4ad7aa_NeikiAnalytics.exe

  • Size

    2.0MB

  • Sample

    240701-c1t4gsxanp

  • MD5

    008c99e84793064e3e94f5f3c187e160

  • SHA1

    2c8012476ef5989eafadf32a4486f7146b05ce5a

  • SHA256

    2ee8c58eefd2d3689f0523219c43e754121b268eb61d37bb8d0eea3b3c4ad7aa

  • SHA512

    0ecbb50241b61e405f5c3a75b56102dddf0b931e468ba1148dd94cbfc17d1297cad79105ab16f2720a25bc5694ed5654f5e4cf8f06d460ee9cc4752326fe0916

  • SSDEEP

    49152:Vea/Hk44mKRGkUED8Z5nWcBm1GznCMPfP:M2koXEI5VM1GznTPX

Malware Config

Targets

    • Target

      2ee8c58eefd2d3689f0523219c43e754121b268eb61d37bb8d0eea3b3c4ad7aa_NeikiAnalytics.exe

    • Size

      2.0MB

    • MD5

      008c99e84793064e3e94f5f3c187e160

    • SHA1

      2c8012476ef5989eafadf32a4486f7146b05ce5a

    • SHA256

      2ee8c58eefd2d3689f0523219c43e754121b268eb61d37bb8d0eea3b3c4ad7aa

    • SHA512

      0ecbb50241b61e405f5c3a75b56102dddf0b931e468ba1148dd94cbfc17d1297cad79105ab16f2720a25bc5694ed5654f5e4cf8f06d460ee9cc4752326fe0916

    • SSDEEP

      49152:Vea/Hk44mKRGkUED8Z5nWcBm1GznCMPfP:M2koXEI5VM1GznTPX

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks