General

  • Target

    0e25f1909c866efa10efadc7716f96c0_NeikiAnalytics.exe

  • Size

    97KB

  • Sample

    240516-w45h6saa84

  • MD5

    0e25f1909c866efa10efadc7716f96c0

  • SHA1

    7d3a44a1270c6fe57e8b6a8d75ecb47775446116

  • SHA256

    29003284b80a1ce308fa324bb31d9d45f90a0969f99a4fb1ea044ac93f82ed00

  • SHA512

    20f908f6da2f0a525c9a9a14f9caab84d01e2ba03e9db928b1aff6b64958855dd3a7dba1a2d2c27bf46f29211804370cab2e26a629fbe527fe530d1ba68df589

  • SSDEEP

    3072:EgqgYPbly/kpkUAa6DjMn+DOvh16WjvR:xqgYbp6Dm+DQ1bj

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0e25f1909c866efa10efadc7716f96c0_NeikiAnalytics.exe

    • Size

      97KB

    • MD5

      0e25f1909c866efa10efadc7716f96c0

    • SHA1

      7d3a44a1270c6fe57e8b6a8d75ecb47775446116

    • SHA256

      29003284b80a1ce308fa324bb31d9d45f90a0969f99a4fb1ea044ac93f82ed00

    • SHA512

      20f908f6da2f0a525c9a9a14f9caab84d01e2ba03e9db928b1aff6b64958855dd3a7dba1a2d2c27bf46f29211804370cab2e26a629fbe527fe530d1ba68df589

    • SSDEEP

      3072:EgqgYPbly/kpkUAa6DjMn+DOvh16WjvR:xqgYbp6Dm+DQ1bj

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks