General
-
Target
387c371f816050c0729df0b345fc0ce0_NeikiAnalytics.exe
-
Size
283KB
-
Sample
240516-z514xsgh24
-
MD5
387c371f816050c0729df0b345fc0ce0
-
SHA1
0098f938660fbfd4d6429e47b6035ba4213957d7
-
SHA256
4b053ad3f47dea7d4ef2f8fbd29df9354777264611c847db40d82ac45e270505
-
SHA512
3e8fe8420f19915f3c7a9070da30cc12d81ea07d8ff3668ac799bb353bcf716ef02c0b308ffd7f727ea41f349c7a1b47a514fef7bae6afddaed1cd925593d109
-
SSDEEP
6144:UvEh2U+T6i5LirrllHy4HUcMQY6pjey5KIpAfc9:GEhN+T5xYrllrU7QY6pj95Fd9
Static task
static1
Behavioral task
behavioral1
Sample
387c371f816050c0729df0b345fc0ce0_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
387c371f816050c0729df0b345fc0ce0_NeikiAnalytics.exe
-
Size
283KB
-
MD5
387c371f816050c0729df0b345fc0ce0
-
SHA1
0098f938660fbfd4d6429e47b6035ba4213957d7
-
SHA256
4b053ad3f47dea7d4ef2f8fbd29df9354777264611c847db40d82ac45e270505
-
SHA512
3e8fe8420f19915f3c7a9070da30cc12d81ea07d8ff3668ac799bb353bcf716ef02c0b308ffd7f727ea41f349c7a1b47a514fef7bae6afddaed1cd925593d109
-
SSDEEP
6144:UvEh2U+T6i5LirrllHy4HUcMQY6pjey5KIpAfc9:GEhN+T5xYrllrU7QY6pj95Fd9
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies visiblity of hidden/system files in Explorer
-
Modifies Installed Components in the registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
9