General

  • Target

    3375b5737fda9c01000cd2b59bb24a2fd3ba4fe0a138b91602a90a795000ee4c_NeikiAnalytics.exe

  • Size

    1.4MB

  • Sample

    240701-egfsvsvhnc

  • MD5

    3370bbfd2fba4107eb2307b9b46b91f0

  • SHA1

    e3ec742bf975ee02b42527b3fd2ae41524645fa7

  • SHA256

    3375b5737fda9c01000cd2b59bb24a2fd3ba4fe0a138b91602a90a795000ee4c

  • SHA512

    18febb98fc53822d1b7fdda2c36e314301787a351c522b72459297d2065ef3da8ec4fd8768f058aed7fb6e75bad26b3df8944d9e267cca9ee2435dc2c3b2adb5

  • SSDEEP

    24576:oWj8JchRISA5KvnRR2Zc+Ps0EsHDrRYRYTJMfZhWWNAXeXw3BhJXWg+bhv:VQIRQKRoG6Osj1EY9mDAXZW

Malware Config

Targets

    • Target

      3375b5737fda9c01000cd2b59bb24a2fd3ba4fe0a138b91602a90a795000ee4c_NeikiAnalytics.exe

    • Size

      1.4MB

    • MD5

      3370bbfd2fba4107eb2307b9b46b91f0

    • SHA1

      e3ec742bf975ee02b42527b3fd2ae41524645fa7

    • SHA256

      3375b5737fda9c01000cd2b59bb24a2fd3ba4fe0a138b91602a90a795000ee4c

    • SHA512

      18febb98fc53822d1b7fdda2c36e314301787a351c522b72459297d2065ef3da8ec4fd8768f058aed7fb6e75bad26b3df8944d9e267cca9ee2435dc2c3b2adb5

    • SSDEEP

      24576:oWj8JchRISA5KvnRR2Zc+Ps0EsHDrRYRYTJMfZhWWNAXeXw3BhJXWg+bhv:VQIRQKRoG6Osj1EY9mDAXZW

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks