General
-
Target
89e46153d428fec4239503765c83adf0_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240517-cxtcsadd47
-
MD5
89e46153d428fec4239503765c83adf0
-
SHA1
5db7d9495ec9451737f65727530c3735da6e2fb0
-
SHA256
8ea96c78d3b780edcc6df7ef6bc70d150a05ec41d28c5e260bdece033e1837c4
-
SHA512
9e4451d04edfc3c65587b6b20840d298efbae3244195580d3336275fc8064e3f545a3bce8b1ae44186003d5928cbd4b8310ba87e044541ba6e8c519b8dc99057
-
SSDEEP
3072:qgiawSKcuj9DkEiWZYYM43YsIWmpk+rE90:DNwiu1kEd5M1pk8ES
Static task
static1
Behavioral task
behavioral1
Sample
89e46153d428fec4239503765c83adf0_NeikiAnalytics.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
89e46153d428fec4239503765c83adf0_NeikiAnalytics.exe
-
Size
120KB
-
MD5
89e46153d428fec4239503765c83adf0
-
SHA1
5db7d9495ec9451737f65727530c3735da6e2fb0
-
SHA256
8ea96c78d3b780edcc6df7ef6bc70d150a05ec41d28c5e260bdece033e1837c4
-
SHA512
9e4451d04edfc3c65587b6b20840d298efbae3244195580d3336275fc8064e3f545a3bce8b1ae44186003d5928cbd4b8310ba87e044541ba6e8c519b8dc99057
-
SSDEEP
3072:qgiawSKcuj9DkEiWZYYM43YsIWmpk+rE90:DNwiu1kEd5M1pk8ES
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5