General

  • Target

    369d33eff7d9a89c54965b2c02e273f7c5dfb7c417a731f5f8e748ba829b2aae_NeikiAnalytics.exe

  • Size

    1.8MB

  • Sample

    240701-ffysqazepn

  • MD5

    5739315e71b132b6ea380e634bb7ee30

  • SHA1

    8a70cb0d163ece05dde8b67dd85e1db1d98a7017

  • SHA256

    369d33eff7d9a89c54965b2c02e273f7c5dfb7c417a731f5f8e748ba829b2aae

  • SHA512

    03fc3ab1eeb33ab1b5c576e0fd9f7e4b2fc4c2169e3a11b63eaa4625a586b3c7be6ba4e273c1c45672133f12794eedb19b7682ccb5c153b651ed6e248ba505f1

  • SSDEEP

    24576:oWpxSC/25QUGibGGNUkT+tK4DMdGvT8x1ZtBNvdn4C3yqJZbH2gwy5uN1je3tRA3:VpPmGibXTMROnTn4CCIZbFY2tRq0qL

Malware Config

Targets

    • Target

      369d33eff7d9a89c54965b2c02e273f7c5dfb7c417a731f5f8e748ba829b2aae_NeikiAnalytics.exe

    • Size

      1.8MB

    • MD5

      5739315e71b132b6ea380e634bb7ee30

    • SHA1

      8a70cb0d163ece05dde8b67dd85e1db1d98a7017

    • SHA256

      369d33eff7d9a89c54965b2c02e273f7c5dfb7c417a731f5f8e748ba829b2aae

    • SHA512

      03fc3ab1eeb33ab1b5c576e0fd9f7e4b2fc4c2169e3a11b63eaa4625a586b3c7be6ba4e273c1c45672133f12794eedb19b7682ccb5c153b651ed6e248ba505f1

    • SSDEEP

      24576:oWpxSC/25QUGibGGNUkT+tK4DMdGvT8x1ZtBNvdn4C3yqJZbH2gwy5uN1je3tRA3:VpPmGibXTMROnTn4CCIZbFY2tRq0qL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks