General

  • Target

    8ff67929e46a15f64fc0e27cdfba6920_NeikiAnalytics.exe

  • Size

    120KB

  • Sample

    240517-dcj42sdh9w

  • MD5

    8ff67929e46a15f64fc0e27cdfba6920

  • SHA1

    312b802657d5214e37a63c7d5d5305d15432b3da

  • SHA256

    bfdf454da76a7a7d3e7fa6743867668c7862b53fff6f67f3adc82fcd14406d98

  • SHA512

    ae35ddb9809d19af839636b9bf08b67fade445456c6946c5676cc6741595fe5280749e39513e0f48f433c97da0c149255c49eb143b037dd3b178af7a75c5b06c

  • SSDEEP

    3072:kXLY9+q+jwOMe9Xk4imY/b38blC+Kvmh7S:kYb2My8/b8bleOh7S

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8ff67929e46a15f64fc0e27cdfba6920_NeikiAnalytics.exe

    • Size

      120KB

    • MD5

      8ff67929e46a15f64fc0e27cdfba6920

    • SHA1

      312b802657d5214e37a63c7d5d5305d15432b3da

    • SHA256

      bfdf454da76a7a7d3e7fa6743867668c7862b53fff6f67f3adc82fcd14406d98

    • SHA512

      ae35ddb9809d19af839636b9bf08b67fade445456c6946c5676cc6741595fe5280749e39513e0f48f433c97da0c149255c49eb143b037dd3b178af7a75c5b06c

    • SSDEEP

      3072:kXLY9+q+jwOMe9Xk4imY/b38blC+Kvmh7S:kYb2My8/b8bleOh7S

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Modify Registry

5
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks