General

  • Target

    3503bcf9ce675d8ce7e982cb8402178de966bf8f1de4fa3c5a8ef68065e058c0_NeikiAnalytics.exe

  • Size

    635KB

  • Sample

    240701-ezk6aswdmg

  • MD5

    d499851756cad4fd4a40a464deb60e00

  • SHA1

    afe4777959450bb9eacc51d771d9abc69fde2d0e

  • SHA256

    3503bcf9ce675d8ce7e982cb8402178de966bf8f1de4fa3c5a8ef68065e058c0

  • SHA512

    195ac559ba0552eb22e3804fd035817c4d7f7b98235f24afb37a86ae9a0b0de7f4889de44fbcf7f15ffc9b5717a0e1e98e47b8255de4395e729d596cc83ea49c

  • SSDEEP

    12288:dXCNi9B1pXCb3mQQPR5cJtaG51SmHIW813HJwiBcI8G2mLrASJZssmpP:oW1EqjcJtl5cOIr1ZwiGXG2ArPlCP

Malware Config

Targets

    • Target

      3503bcf9ce675d8ce7e982cb8402178de966bf8f1de4fa3c5a8ef68065e058c0_NeikiAnalytics.exe

    • Size

      635KB

    • MD5

      d499851756cad4fd4a40a464deb60e00

    • SHA1

      afe4777959450bb9eacc51d771d9abc69fde2d0e

    • SHA256

      3503bcf9ce675d8ce7e982cb8402178de966bf8f1de4fa3c5a8ef68065e058c0

    • SHA512

      195ac559ba0552eb22e3804fd035817c4d7f7b98235f24afb37a86ae9a0b0de7f4889de44fbcf7f15ffc9b5717a0e1e98e47b8255de4395e729d596cc83ea49c

    • SSDEEP

      12288:dXCNi9B1pXCb3mQQPR5cJtaG51SmHIW813HJwiBcI8G2mLrASJZssmpP:oW1EqjcJtl5cOIr1ZwiGXG2ArPlCP

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks