General
-
Target
ab944d5f328f830aeb453a88b4c13540_NeikiAnalytics
-
Size
65KB
-
Sample
240516-gqy2xafd24
-
MD5
ab944d5f328f830aeb453a88b4c13540
-
SHA1
e4ccac515006eab388ff1694904063e73374f808
-
SHA256
ca43bd40aa55e72609501248bb139a1f33b0eebf13f6c005d6423b368c944e9a
-
SHA512
6591406a41fb68161b50d7018994fb3f821f695e9930d2ee282448d16d71e139cb88b5e48bfbc69b7cb198add5734d069b2eadaf7f33b232dcbdb37aaa587f42
-
SSDEEP
1536:3N6IJplHhmEkYAif67JhtNjKNhBj4qJNQtboZO7cBe:5NhmwU7JZKN3JJSMZO7Z
Static task
static1
Behavioral task
behavioral1
Sample
ab944d5f328f830aeb453a88b4c13540_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ab944d5f328f830aeb453a88b4c13540_NeikiAnalytics
-
Size
65KB
-
MD5
ab944d5f328f830aeb453a88b4c13540
-
SHA1
e4ccac515006eab388ff1694904063e73374f808
-
SHA256
ca43bd40aa55e72609501248bb139a1f33b0eebf13f6c005d6423b368c944e9a
-
SHA512
6591406a41fb68161b50d7018994fb3f821f695e9930d2ee282448d16d71e139cb88b5e48bfbc69b7cb198add5734d069b2eadaf7f33b232dcbdb37aaa587f42
-
SSDEEP
1536:3N6IJplHhmEkYAif67JhtNjKNhBj4qJNQtboZO7cBe:5NhmwU7JZKN3JJSMZO7Z
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5