General
-
Target
55781e40770195cc1b75e760f82c9200_NeikiAnalytics
-
Size
120KB
-
Sample
240510-dgjn3sfa8s
-
MD5
55781e40770195cc1b75e760f82c9200
-
SHA1
89ed8a4c7206e4b742da2e689a7270cc5a0619d4
-
SHA256
6c1b36122a057993a93e2855da154b70248c6cc2b739e432d50129c5d53bfd5e
-
SHA512
713d6ec07de914c7c4b2159377d2f98e56593fde45b8fcf7e158abe3f6b633cdc3f98a384cdb2ea620b62d3cdc52f28cbff741cf6443592ba95996918589dc12
-
SSDEEP
1536:fxBhYID8GlsXLY5068jvFWFSNAV3SJ2ldH2YwBjFfakWvlfVaRyo1nCCeYqTU/Fe:JBhYY8GubLjF0s4D07eBVbCXqA+Tx
Static task
static1
Behavioral task
behavioral1
Sample
55781e40770195cc1b75e760f82c9200_NeikiAnalytics.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
55781e40770195cc1b75e760f82c9200_NeikiAnalytics
-
Size
120KB
-
MD5
55781e40770195cc1b75e760f82c9200
-
SHA1
89ed8a4c7206e4b742da2e689a7270cc5a0619d4
-
SHA256
6c1b36122a057993a93e2855da154b70248c6cc2b739e432d50129c5d53bfd5e
-
SHA512
713d6ec07de914c7c4b2159377d2f98e56593fde45b8fcf7e158abe3f6b633cdc3f98a384cdb2ea620b62d3cdc52f28cbff741cf6443592ba95996918589dc12
-
SSDEEP
1536:fxBhYID8GlsXLY5068jvFWFSNAV3SJ2ldH2YwBjFfakWvlfVaRyo1nCCeYqTU/Fe:JBhYY8GubLjF0s4D07eBVbCXqA+Tx
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5