General
-
Target
8ff67929e46a15f64fc0e27cdfba6920_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240517-dcj42sdh9w
-
MD5
8ff67929e46a15f64fc0e27cdfba6920
-
SHA1
312b802657d5214e37a63c7d5d5305d15432b3da
-
SHA256
bfdf454da76a7a7d3e7fa6743867668c7862b53fff6f67f3adc82fcd14406d98
-
SHA512
ae35ddb9809d19af839636b9bf08b67fade445456c6946c5676cc6741595fe5280749e39513e0f48f433c97da0c149255c49eb143b037dd3b178af7a75c5b06c
-
SSDEEP
3072:kXLY9+q+jwOMe9Xk4imY/b38blC+Kvmh7S:kYb2My8/b8bleOh7S
Static task
static1
Behavioral task
behavioral1
Sample
8ff67929e46a15f64fc0e27cdfba6920_NeikiAnalytics.dll
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8ff67929e46a15f64fc0e27cdfba6920_NeikiAnalytics.exe
-
Size
120KB
-
MD5
8ff67929e46a15f64fc0e27cdfba6920
-
SHA1
312b802657d5214e37a63c7d5d5305d15432b3da
-
SHA256
bfdf454da76a7a7d3e7fa6743867668c7862b53fff6f67f3adc82fcd14406d98
-
SHA512
ae35ddb9809d19af839636b9bf08b67fade445456c6946c5676cc6741595fe5280749e39513e0f48f433c97da0c149255c49eb143b037dd3b178af7a75c5b06c
-
SSDEEP
3072:kXLY9+q+jwOMe9Xk4imY/b38blC+Kvmh7S:kYb2My8/b8bleOh7S
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3