General
-
Target
8fcdb76412a96b10c668b68196b3a850_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240517-db5pcsdh7t
-
MD5
8fcdb76412a96b10c668b68196b3a850
-
SHA1
b499fa31a7f3eb9b707f54a77d8ed1f906706495
-
SHA256
db944cc1ab8c9aa2583aab530d49daae58db084555cb0c3e2b65da0d92b3821f
-
SHA512
7a03ca6b3ff3cdaf1d77149d48b568775c7b2e6b44d74c1191142deba4037b54a8aa9d145991d19fc3d09bb93dd247bbe203f1848716dca761db02af3a2240f0
-
SSDEEP
1536:c6W94JW6kR+uZyI/oJwcj6bAHP4yPwO39fxcgcpTw17IovI0UFpqHeN03gd9MK6J:U9sgyI/oJrj6bAHP4nQ9Wwl+FFkH80w
Static task
static1
Behavioral task
behavioral1
Sample
8fcdb76412a96b10c668b68196b3a850_NeikiAnalytics.dll
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8fcdb76412a96b10c668b68196b3a850_NeikiAnalytics.exe
-
Size
120KB
-
MD5
8fcdb76412a96b10c668b68196b3a850
-
SHA1
b499fa31a7f3eb9b707f54a77d8ed1f906706495
-
SHA256
db944cc1ab8c9aa2583aab530d49daae58db084555cb0c3e2b65da0d92b3821f
-
SHA512
7a03ca6b3ff3cdaf1d77149d48b568775c7b2e6b44d74c1191142deba4037b54a8aa9d145991d19fc3d09bb93dd247bbe203f1848716dca761db02af3a2240f0
-
SSDEEP
1536:c6W94JW6kR+uZyI/oJwcj6bAHP4yPwO39fxcgcpTw17IovI0UFpqHeN03gd9MK6J:U9sgyI/oJrj6bAHP4nQ9Wwl+FFkH80w
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5