General
-
Target
9e4f78f197d3bc8103dddf9604a961b0_NeikiAnalytics.exe
-
Size
4.2MB
-
Sample
240517-edgwraga5v
-
MD5
9e4f78f197d3bc8103dddf9604a961b0
-
SHA1
65e6e710beb64ecd466ef88ba15a517000c99a83
-
SHA256
8cdb3b8b462ab55c11416cf4c21ee91ca89a9ce8177421765d9ee6728d438f38
-
SHA512
54e443921158eb7116151abd537ead903978bc1fdc19f91a754a59255c1c4ae2e98d967eef8582e61dc7c9fd9adfa904f34a60fafb8b7a6de595c34a7153feab
-
SSDEEP
98304:yKgxxBveR/oHdgls3/hG8mRHbzQgKTEh8KdJztKHH5kYfpjCuC/A7cEdw:3gfReRg9J3dnboh8MzI5FjCuvNdw
Static task
static1
Behavioral task
behavioral1
Sample
9e4f78f197d3bc8103dddf9604a961b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9e4f78f197d3bc8103dddf9604a961b0_NeikiAnalytics.exe
-
Size
4.2MB
-
MD5
9e4f78f197d3bc8103dddf9604a961b0
-
SHA1
65e6e710beb64ecd466ef88ba15a517000c99a83
-
SHA256
8cdb3b8b462ab55c11416cf4c21ee91ca89a9ce8177421765d9ee6728d438f38
-
SHA512
54e443921158eb7116151abd537ead903978bc1fdc19f91a754a59255c1c4ae2e98d967eef8582e61dc7c9fd9adfa904f34a60fafb8b7a6de595c34a7153feab
-
SSDEEP
98304:yKgxxBveR/oHdgls3/hG8mRHbzQgKTEh8KdJztKHH5kYfpjCuC/A7cEdw:3gfReRg9J3dnboh8MzI5FjCuvNdw
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5