General
-
Target
16b22397e700df66ec9cef954f8413d0_NeikiAnalytics.exe
-
Size
65KB
-
Sample
240516-xp13wabe3w
-
MD5
16b22397e700df66ec9cef954f8413d0
-
SHA1
a20b5e2f07f69146f8fd192f4bd03578809e4c5d
-
SHA256
612cc8bb47cb198feabf4c185d747325d6581e72fa6ffb238c8df15db3068697
-
SHA512
05f46fc77acdf1b9af86260ebb525164e093490d1849772875538e6d27ea32e914d6d34bd805bb84d38698123e24c1a0bb24f15f86b2a37b0cfb52208636c527
-
SSDEEP
1536:D2C6v/fAZUeNCG334YsmXLABsb5vKI+SG1SNs:oAXNCY3NsuMaT1Ns
Static task
static1
Behavioral task
behavioral1
Sample
16b22397e700df66ec9cef954f8413d0_NeikiAnalytics.exe
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
16b22397e700df66ec9cef954f8413d0_NeikiAnalytics.exe
-
Size
65KB
-
MD5
16b22397e700df66ec9cef954f8413d0
-
SHA1
a20b5e2f07f69146f8fd192f4bd03578809e4c5d
-
SHA256
612cc8bb47cb198feabf4c185d747325d6581e72fa6ffb238c8df15db3068697
-
SHA512
05f46fc77acdf1b9af86260ebb525164e093490d1849772875538e6d27ea32e914d6d34bd805bb84d38698123e24c1a0bb24f15f86b2a37b0cfb52208636c527
-
SSDEEP
1536:D2C6v/fAZUeNCG334YsmXLABsb5vKI+SG1SNs:oAXNCY3NsuMaT1Ns
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5