General

  • Target

    2ed89f2ceb8de801e1cbf61f8eb58f442d2c0d15cbc3fb815e8d49b8a9e13137_NeikiAnalytics.exe

  • Size

    793KB

  • Sample

    240701-czxszstcpd

  • MD5

    c8de3fbfbf784ed6267d71cfac2b0b30

  • SHA1

    e7d3a063644f20366f19aa645a605a4c1104cce6

  • SHA256

    2ed89f2ceb8de801e1cbf61f8eb58f442d2c0d15cbc3fb815e8d49b8a9e13137

  • SHA512

    e314db335ca723e4929e665916a6f0806637d761d305c76ad4f3459996d5634f7952385e8f6d70b98f119a09713d9e0367ffbc4fe4398b35dcb4cbbc0f0aca9d

  • SSDEEP

    12288:OWji9BEx2xXE8PGX7apWlaye+WAOouHfMHZo9d4Ntl8ZeUn4v3mNWfT2:CK21/PGrapW8yAAduHfMHAC5KrNWfS

Malware Config

Targets

    • Target

      2ed89f2ceb8de801e1cbf61f8eb58f442d2c0d15cbc3fb815e8d49b8a9e13137_NeikiAnalytics.exe

    • Size

      793KB

    • MD5

      c8de3fbfbf784ed6267d71cfac2b0b30

    • SHA1

      e7d3a063644f20366f19aa645a605a4c1104cce6

    • SHA256

      2ed89f2ceb8de801e1cbf61f8eb58f442d2c0d15cbc3fb815e8d49b8a9e13137

    • SHA512

      e314db335ca723e4929e665916a6f0806637d761d305c76ad4f3459996d5634f7952385e8f6d70b98f119a09713d9e0367ffbc4fe4398b35dcb4cbbc0f0aca9d

    • SSDEEP

      12288:OWji9BEx2xXE8PGX7apWlaye+WAOouHfMHZo9d4Ntl8ZeUn4v3mNWfT2:CK21/PGrapW8yAAduHfMHAC5KrNWfS

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks