General

  • Target

    2ecbc28d2d59a02458c245475a0d0f314f258ee420597fd8ae04dd391a0bf022_NeikiAnalytics.exe

  • Size

    7.8MB

  • Sample

    240701-cy6dqstcme

  • MD5

    c9a910f26a615946a603ee9253fb73e0

  • SHA1

    895dd6e15ef88dbc647c0b5f312ae7791104e845

  • SHA256

    2ecbc28d2d59a02458c245475a0d0f314f258ee420597fd8ae04dd391a0bf022

  • SHA512

    92b1496df078ea97ca53fbd995fded9ca0a2a80bac2b313bb5b2e719330c022ae0ad887f956d8964ddc3d2270c2837927cce130ccd5f17e64c1f0a2f38bea4d5

  • SSDEEP

    196608:wTy0MbhL/3ezVz7907o33VpNAEXDnUzXPh1:wu7OJN07olpeEwrp1

Malware Config

Targets

    • Target

      2ecbc28d2d59a02458c245475a0d0f314f258ee420597fd8ae04dd391a0bf022_NeikiAnalytics.exe

    • Size

      7.8MB

    • MD5

      c9a910f26a615946a603ee9253fb73e0

    • SHA1

      895dd6e15ef88dbc647c0b5f312ae7791104e845

    • SHA256

      2ecbc28d2d59a02458c245475a0d0f314f258ee420597fd8ae04dd391a0bf022

    • SHA512

      92b1496df078ea97ca53fbd995fded9ca0a2a80bac2b313bb5b2e719330c022ae0ad887f956d8964ddc3d2270c2837927cce130ccd5f17e64c1f0a2f38bea4d5

    • SSDEEP

      196608:wTy0MbhL/3ezVz7907o33VpNAEXDnUzXPh1:wu7OJN07olpeEwrp1

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks