General
-
Target
35712bb9de2158cf8f0fdce4e50a4b10_NEIKI
-
Size
65KB
-
Sample
240508-ksazmseh26
-
MD5
35712bb9de2158cf8f0fdce4e50a4b10
-
SHA1
f7cfb72cb31d45511417de8ad9db82d18480ae00
-
SHA256
f0010b1d7d8dde1f2be7ae340a09fbf53cfa87a4af0635d56f9e170cf60363fd
-
SHA512
2fb890167722ae1aa63a2f5feb6e230c0a71dab039f76c367a49e4a42bf2f12bad5fb06d9c000065742a0bfd122eb0ea1868b7a4493e5ecbed2d9030363479ec
-
SSDEEP
1536:YcB5+RmYGVWZv/PK6+Q6BjnWBmlA3359wT1WFBMfXDZc:YcB5+YVsnddB0m3bwTS4XDZc
Static task
static1
Behavioral task
behavioral1
Sample
35712bb9de2158cf8f0fdce4e50a4b10_NEIKI.exe
Resource
win7-20240419-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
35712bb9de2158cf8f0fdce4e50a4b10_NEIKI
-
Size
65KB
-
MD5
35712bb9de2158cf8f0fdce4e50a4b10
-
SHA1
f7cfb72cb31d45511417de8ad9db82d18480ae00
-
SHA256
f0010b1d7d8dde1f2be7ae340a09fbf53cfa87a4af0635d56f9e170cf60363fd
-
SHA512
2fb890167722ae1aa63a2f5feb6e230c0a71dab039f76c367a49e4a42bf2f12bad5fb06d9c000065742a0bfd122eb0ea1868b7a4493e5ecbed2d9030363479ec
-
SSDEEP
1536:YcB5+RmYGVWZv/PK6+Q6BjnWBmlA3359wT1WFBMfXDZc:YcB5+YVsnddB0m3bwTS4XDZc
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5