General

  • Target

    32b8bfc0681783f271b214523662a93241b3aa123d4346328addff4fa851a721_NeikiAnalytics.exe

  • Size

    1.9MB

  • Sample

    240701-d8bgsavfle

  • MD5

    8e246f357d0236d060189704afbaa460

  • SHA1

    82b9a0ff1c9294912e9d28b04691cb90c842d571

  • SHA256

    32b8bfc0681783f271b214523662a93241b3aa123d4346328addff4fa851a721

  • SHA512

    f0e217f41701c67a3e8257bf6f2163fe020e1227c0666e68133c61827b4c52ec3e30d64a543b9ba181c5705f96f0cddec90c4afa3d63716f2e36b40b3d1e2646

  • SSDEEP

    49152:CdHnHSodbn6Oddabzqudy8IwDWD/K5vDYoBKbn30kvji7LmLHdY:4HZbnZddyq77TyBDYdbn3bHLu

Malware Config

Targets

    • Target

      32b8bfc0681783f271b214523662a93241b3aa123d4346328addff4fa851a721_NeikiAnalytics.exe

    • Size

      1.9MB

    • MD5

      8e246f357d0236d060189704afbaa460

    • SHA1

      82b9a0ff1c9294912e9d28b04691cb90c842d571

    • SHA256

      32b8bfc0681783f271b214523662a93241b3aa123d4346328addff4fa851a721

    • SHA512

      f0e217f41701c67a3e8257bf6f2163fe020e1227c0666e68133c61827b4c52ec3e30d64a543b9ba181c5705f96f0cddec90c4afa3d63716f2e36b40b3d1e2646

    • SSDEEP

      49152:CdHnHSodbn6Oddabzqudy8IwDWD/K5vDYoBKbn30kvji7LmLHdY:4HZbnZddyq77TyBDYdbn3bHLu

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks