General

  • Target

    c6b94be23738cda81563082e8da394b0_NeikiAnalytics.exe

  • Size

    1.4MB

  • Sample

    240517-hnjpwaed6x

  • MD5

    c6b94be23738cda81563082e8da394b0

  • SHA1

    38d7083cb91f0c24e4237236373c5cf79b015c09

  • SHA256

    95a17a1f7f2abdbc3b97cb782f701fd0126dbcc8f3228d173a0e6fa74570134c

  • SHA512

    47709645204742c2d965431cabec98b8af0429220c79dba85efce59f0f63bc7800fd2c7cade3d387cfd6b3ef03c6466fc3967fd40a21ec7ac508afdc768b9080

  • SSDEEP

    24576:xFa9+8xUfKf1EAB4RPKkzBaQcF52+mfhJWOxI3O74N0y5CCeXpouLktTv+:xm+8xUfKf1EABiVkQcFFm5JWgL4N0C8T

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c6b94be23738cda81563082e8da394b0_NeikiAnalytics.exe

    • Size

      1.4MB

    • MD5

      c6b94be23738cda81563082e8da394b0

    • SHA1

      38d7083cb91f0c24e4237236373c5cf79b015c09

    • SHA256

      95a17a1f7f2abdbc3b97cb782f701fd0126dbcc8f3228d173a0e6fa74570134c

    • SHA512

      47709645204742c2d965431cabec98b8af0429220c79dba85efce59f0f63bc7800fd2c7cade3d387cfd6b3ef03c6466fc3967fd40a21ec7ac508afdc768b9080

    • SSDEEP

      24576:xFa9+8xUfKf1EAB4RPKkzBaQcF52+mfhJWOxI3O74N0y5CCeXpouLktTv+:xm+8xUfKf1EABiVkQcFFm5JWgL4N0C8T

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks