General
-
Target
9ba79ee837b3ac6193d2ee4b66e6f673_NeikiAnalytics.exe
-
Size
97KB
-
Sample
240517-d7hvgafh47
-
MD5
9ba79ee837b3ac6193d2ee4b66e6f673
-
SHA1
3d4fd6df4d4fb0bfd9a9c2bc02a026674e57555d
-
SHA256
6b462afd7bdeb1c8549cc3c98e111d93869a0dd8f4ff94dcfe7206a806d1515a
-
SHA512
6c628a2dd5392df6f02be8aec8a8f4cb33584af1494014da25f167b01544359ff4d881dbce32d18b94ba8db628fd66791dc4b5834503027f5865241b97d2c2a5
-
SSDEEP
1536:yzRN1dEkxgpgmC8mPkdTdYWeCLjcWU4VK0BOewg9:yzRvdnxgVmQdYkPK0BjL
Static task
static1
Behavioral task
behavioral1
Sample
9ba79ee837b3ac6193d2ee4b66e6f673_NeikiAnalytics.exe
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9ba79ee837b3ac6193d2ee4b66e6f673_NeikiAnalytics.exe
-
Size
97KB
-
MD5
9ba79ee837b3ac6193d2ee4b66e6f673
-
SHA1
3d4fd6df4d4fb0bfd9a9c2bc02a026674e57555d
-
SHA256
6b462afd7bdeb1c8549cc3c98e111d93869a0dd8f4ff94dcfe7206a806d1515a
-
SHA512
6c628a2dd5392df6f02be8aec8a8f4cb33584af1494014da25f167b01544359ff4d881dbce32d18b94ba8db628fd66791dc4b5834503027f5865241b97d2c2a5
-
SSDEEP
1536:yzRN1dEkxgpgmC8mPkdTdYWeCLjcWU4VK0BOewg9:yzRvdnxgVmQdYkPK0BjL
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5