General
-
Target
a7e1ea499035d2f7a71c24838fc6b800_NeikiAnalytics
-
Size
65KB
-
Sample
240511-kaevwagf8s
-
MD5
a7e1ea499035d2f7a71c24838fc6b800
-
SHA1
4bebfd7aa770902ebbc0c82d36439883a8f9db89
-
SHA256
9fe51238c079bdeed0e9bb1b273195ec856a83c436c055c2fdd6559c4a4d3651
-
SHA512
0b5f441bf699cebd307e25893dc797927b58394416548cc1467402f9e6fb2044ed2c4d4141cf092f9af1fa9632a27ab4ef401ce37fb231e336a44c9d1a3720c3
-
SSDEEP
1536:f0Jv7TW2sc5dYYHgRcN8o3hK6x2hQFTI36CuOMlSeO:f0J22z5pHicN8d136ClkSeO
Static task
static1
Behavioral task
behavioral1
Sample
a7e1ea499035d2f7a71c24838fc6b800_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a7e1ea499035d2f7a71c24838fc6b800_NeikiAnalytics
-
Size
65KB
-
MD5
a7e1ea499035d2f7a71c24838fc6b800
-
SHA1
4bebfd7aa770902ebbc0c82d36439883a8f9db89
-
SHA256
9fe51238c079bdeed0e9bb1b273195ec856a83c436c055c2fdd6559c4a4d3651
-
SHA512
0b5f441bf699cebd307e25893dc797927b58394416548cc1467402f9e6fb2044ed2c4d4141cf092f9af1fa9632a27ab4ef401ce37fb231e336a44c9d1a3720c3
-
SSDEEP
1536:f0Jv7TW2sc5dYYHgRcN8o3hK6x2hQFTI36CuOMlSeO:f0J22z5pHicN8d136ClkSeO
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5