General
-
Target
bd6fe4bdd2417b19b84e4dec47ffcf30_NeikiAnalytics.exe
-
Size
97KB
-
Sample
240517-gy168sdb95
-
MD5
bd6fe4bdd2417b19b84e4dec47ffcf30
-
SHA1
20beb3154d02770e96fe6c92640f4db7bcfdac90
-
SHA256
3e49ce1e97c76eed7d055c239715135fdfc1f9ee5486381d6a453d075d1a711c
-
SHA512
5c2b42f28c7130e67c0d2a5fb6a9dc367ec11634ac2c5d9b84074dacb095a873d26792e6c85e076c1a90eda798d88d7d5fb6f5a68a0bdd509e6d2c383f3b1f5d
-
SSDEEP
3072:/Ztqw8cLb9jMuv4/jJgb4Q+XKN2iZ1KLSL:R4w8cPdMGc5Q9N2Sz
Static task
static1
Behavioral task
behavioral1
Sample
bd6fe4bdd2417b19b84e4dec47ffcf30_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
bd6fe4bdd2417b19b84e4dec47ffcf30_NeikiAnalytics.exe
-
Size
97KB
-
MD5
bd6fe4bdd2417b19b84e4dec47ffcf30
-
SHA1
20beb3154d02770e96fe6c92640f4db7bcfdac90
-
SHA256
3e49ce1e97c76eed7d055c239715135fdfc1f9ee5486381d6a453d075d1a711c
-
SHA512
5c2b42f28c7130e67c0d2a5fb6a9dc367ec11634ac2c5d9b84074dacb095a873d26792e6c85e076c1a90eda798d88d7d5fb6f5a68a0bdd509e6d2c383f3b1f5d
-
SSDEEP
3072:/Ztqw8cLb9jMuv4/jJgb4Q+XKN2iZ1KLSL:R4w8cPdMGc5Q9N2Sz
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5