General
-
Target
84c494b41aa13428d40e0bfed9a0fc30_NeikiAnalytics.exe
-
Size
2.5MB
-
Sample
240517-cj1jyacg72
-
MD5
84c494b41aa13428d40e0bfed9a0fc30
-
SHA1
bb411616bdf103b5e69b1c3dc7366b0d0ab4ec57
-
SHA256
39d08570f12ee1ade69e872d4b64c07e229c2e71cffff492e419c6c451d82ece
-
SHA512
18d7fe06400318c24e921cfcf282310297ae2bc0a13ea1ec0276d737dd4a427e5cb735002d503b3016f5aa493db64326627b4255e85f034ec8e295f43a8faebe
-
SSDEEP
49152:D0iC/rk62xWNol+5gOsLddaMXSFHXwy0t96c2Y+1f0CfQWl:6rZ23Abs5DCFHXwV+f1/Qg
Static task
static1
Behavioral task
behavioral1
Sample
84c494b41aa13428d40e0bfed9a0fc30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
84c494b41aa13428d40e0bfed9a0fc30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
84c494b41aa13428d40e0bfed9a0fc30_NeikiAnalytics.exe
-
Size
2.5MB
-
MD5
84c494b41aa13428d40e0bfed9a0fc30
-
SHA1
bb411616bdf103b5e69b1c3dc7366b0d0ab4ec57
-
SHA256
39d08570f12ee1ade69e872d4b64c07e229c2e71cffff492e419c6c451d82ece
-
SHA512
18d7fe06400318c24e921cfcf282310297ae2bc0a13ea1ec0276d737dd4a427e5cb735002d503b3016f5aa493db64326627b4255e85f034ec8e295f43a8faebe
-
SSDEEP
49152:D0iC/rk62xWNol+5gOsLddaMXSFHXwy0t96c2Y+1f0CfQWl:6rZ23Abs5DCFHXwV+f1/Qg
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3