General
-
Target
dcb598376355873419eb50e7a0bf9c3d_NeikiAnalytics.exe
-
Size
65KB
-
Sample
240517-kcrx8ahd91
-
MD5
dcb598376355873419eb50e7a0bf9c3d
-
SHA1
99a98da05215ea31cf1f3a0c6d6ade1569f92189
-
SHA256
6e36ab60b6e4c35f66858048dd62c85525a284b12983a8ffc19e90600ecef488
-
SHA512
fd6f0485e4c08ea8fa7b42325f924d1dd67cf80a41b8bd9acdd6320795c3d5ab41d1a1e97d89f713ae46a5cfefb3f92d1182a61f9d27bbe2d0af49caea428ba2
-
SSDEEP
1536:Wo1J2jmV6wM2N4sZPM5TLyjX+ICKOPy3NIpIg1wb:WoiwH22M5nSPCtPy3m+b
Static task
static1
Behavioral task
behavioral1
Sample
dcb598376355873419eb50e7a0bf9c3d_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
dcb598376355873419eb50e7a0bf9c3d_NeikiAnalytics.exe
-
Size
65KB
-
MD5
dcb598376355873419eb50e7a0bf9c3d
-
SHA1
99a98da05215ea31cf1f3a0c6d6ade1569f92189
-
SHA256
6e36ab60b6e4c35f66858048dd62c85525a284b12983a8ffc19e90600ecef488
-
SHA512
fd6f0485e4c08ea8fa7b42325f924d1dd67cf80a41b8bd9acdd6320795c3d5ab41d1a1e97d89f713ae46a5cfefb3f92d1182a61f9d27bbe2d0af49caea428ba2
-
SSDEEP
1536:Wo1J2jmV6wM2N4sZPM5TLyjX+ICKOPy3NIpIg1wb:WoiwH22M5nSPCtPy3m+b
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5