General
-
Target
14b74d60ee02d76ce1ed39238cd9eda0_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240516-xjz9dsbb27
-
MD5
14b74d60ee02d76ce1ed39238cd9eda0
-
SHA1
92e310d9f0b6cfd0ddf3ad910b552e586a59441d
-
SHA256
a71baf26dace346144dbcf996e231dde3bd9264017c3d2d1a83c0219af3812e4
-
SHA512
342ca2a5651136d5ddfe223b17d42dd3a85e77b53f62a7ee12345bdde60fb708b01569794108a1fa3a907cc03cc21cf9688da3589972864a33d32366752669a5
-
SSDEEP
3072:KOazyR20EGfg/e7EG/8dSOzDHqVnO/O4s39d+fX8m8Y3:KOJOGfd7EK8YmDHAO/CtdyMFY
Static task
static1
Behavioral task
behavioral1
Sample
14b74d60ee02d76ce1ed39238cd9eda0_NeikiAnalytics.dll
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
14b74d60ee02d76ce1ed39238cd9eda0_NeikiAnalytics.exe
-
Size
120KB
-
MD5
14b74d60ee02d76ce1ed39238cd9eda0
-
SHA1
92e310d9f0b6cfd0ddf3ad910b552e586a59441d
-
SHA256
a71baf26dace346144dbcf996e231dde3bd9264017c3d2d1a83c0219af3812e4
-
SHA512
342ca2a5651136d5ddfe223b17d42dd3a85e77b53f62a7ee12345bdde60fb708b01569794108a1fa3a907cc03cc21cf9688da3589972864a33d32366752669a5
-
SSDEEP
3072:KOazyR20EGfg/e7EG/8dSOzDHqVnO/O4s39d+fX8m8Y3:KOJOGfd7EK8YmDHAO/CtdyMFY
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5