General

  • Target

    82961c8abe7ca92695f23bb1a87e2bd0_NeikiAnalytics

  • Size

    120KB

  • Sample

    240512-lzpxtade85

  • MD5

    82961c8abe7ca92695f23bb1a87e2bd0

  • SHA1

    f87196b573a3ef6568eef7ea3d504e09ff3f02e5

  • SHA256

    cf73abc37b3d33d0ca3514b997cf69c0176255d9f038a791a2315431144b8cba

  • SHA512

    1f704a5455ec981d85b5fd78545883ecd33e730db82c299303c7b73a8f57f5d7bc8c52acd20d00ba5c1a035b2616a5688b124d5f404b2343f544f036cd0cf81f

  • SSDEEP

    1536:CvEubaCGp1u+czqcAXBjHax9r4iSl/KqEUouwPvhMB0nQqr/SCB8VnY8tIkMNoU2:6ExrqOlxrax9siUvEBRZnSCBanDIkM/

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      82961c8abe7ca92695f23bb1a87e2bd0_NeikiAnalytics

    • Size

      120KB

    • MD5

      82961c8abe7ca92695f23bb1a87e2bd0

    • SHA1

      f87196b573a3ef6568eef7ea3d504e09ff3f02e5

    • SHA256

      cf73abc37b3d33d0ca3514b997cf69c0176255d9f038a791a2315431144b8cba

    • SHA512

      1f704a5455ec981d85b5fd78545883ecd33e730db82c299303c7b73a8f57f5d7bc8c52acd20d00ba5c1a035b2616a5688b124d5f404b2343f544f036cd0cf81f

    • SSDEEP

      1536:CvEubaCGp1u+czqcAXBjHax9r4iSl/KqEUouwPvhMB0nQqr/SCB8VnY8tIkMNoU2:6ExrqOlxrax9siUvEBRZnSCBanDIkM/

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks