General
-
Target
62da4b065fa3e8e5380effc8c614a7e0_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240517-ajjkbagb9w
-
MD5
62da4b065fa3e8e5380effc8c614a7e0
-
SHA1
b207981214d28b1b6bf4f79dd73f19f84ce7a603
-
SHA256
ce17dbd0610668b44ccc9728c6b99d845bc497907b11c33e7225869725d8cfb2
-
SHA512
dd202a7e0f7f43de38575517c3c13c6a1a6af7f8c282aa89c29e21ec18d70e8e4f5ed13aaaa38ab00ddf150041a65ca8a75e404c4e5ae359780f9d038d184097
-
SSDEEP
3072:DbRSEu+/p84nqralhBIeDb7PpzcLvh8DS:pp84nEy/nDpy8
Static task
static1
Behavioral task
behavioral1
Sample
62da4b065fa3e8e5380effc8c614a7e0_NeikiAnalytics.dll
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
62da4b065fa3e8e5380effc8c614a7e0_NeikiAnalytics.exe
-
Size
120KB
-
MD5
62da4b065fa3e8e5380effc8c614a7e0
-
SHA1
b207981214d28b1b6bf4f79dd73f19f84ce7a603
-
SHA256
ce17dbd0610668b44ccc9728c6b99d845bc497907b11c33e7225869725d8cfb2
-
SHA512
dd202a7e0f7f43de38575517c3c13c6a1a6af7f8c282aa89c29e21ec18d70e8e4f5ed13aaaa38ab00ddf150041a65ca8a75e404c4e5ae359780f9d038d184097
-
SSDEEP
3072:DbRSEu+/p84nqralhBIeDb7PpzcLvh8DS:pp84nEy/nDpy8
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5