General

  • Target

    ab45fc0caf837c513d3b5be1ebea1100_NeikiAnalytics

  • Size

    120KB

  • Sample

    240513-km4d1aeg8x

  • MD5

    ab45fc0caf837c513d3b5be1ebea1100

  • SHA1

    d4d78eb3f0e8149a695ba6fc39b744795a2dfc2f

  • SHA256

    a4f986fe964f9181d27bb2c97bcec3db7d08d56b143d2ff37026bcdb7ba0be7c

  • SHA512

    d353b4cb7374a9ef85ed60302c9033973a0d50508dfd85f8be383ae4310ddffd06c7980c81d0948732a890d183e205d2d69b913a867a6ae1cbdd41375777a397

  • SSDEEP

    3072:pW5qQ+of9pVRtwWFIHEvy+z5d5LE+WdJA:pmqVwGWeOyiZEJ0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ab45fc0caf837c513d3b5be1ebea1100_NeikiAnalytics

    • Size

      120KB

    • MD5

      ab45fc0caf837c513d3b5be1ebea1100

    • SHA1

      d4d78eb3f0e8149a695ba6fc39b744795a2dfc2f

    • SHA256

      a4f986fe964f9181d27bb2c97bcec3db7d08d56b143d2ff37026bcdb7ba0be7c

    • SHA512

      d353b4cb7374a9ef85ed60302c9033973a0d50508dfd85f8be383ae4310ddffd06c7980c81d0948732a890d183e205d2d69b913a867a6ae1cbdd41375777a397

    • SSDEEP

      3072:pW5qQ+of9pVRtwWFIHEvy+z5d5LE+WdJA:pmqVwGWeOyiZEJ0

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks