General

  • Target

    dcb598376355873419eb50e7a0bf9c3d_NeikiAnalytics.exe

  • Size

    65KB

  • Sample

    240517-kcrx8ahd91

  • MD5

    dcb598376355873419eb50e7a0bf9c3d

  • SHA1

    99a98da05215ea31cf1f3a0c6d6ade1569f92189

  • SHA256

    6e36ab60b6e4c35f66858048dd62c85525a284b12983a8ffc19e90600ecef488

  • SHA512

    fd6f0485e4c08ea8fa7b42325f924d1dd67cf80a41b8bd9acdd6320795c3d5ab41d1a1e97d89f713ae46a5cfefb3f92d1182a61f9d27bbe2d0af49caea428ba2

  • SSDEEP

    1536:Wo1J2jmV6wM2N4sZPM5TLyjX+ICKOPy3NIpIg1wb:WoiwH22M5nSPCtPy3m+b

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      dcb598376355873419eb50e7a0bf9c3d_NeikiAnalytics.exe

    • Size

      65KB

    • MD5

      dcb598376355873419eb50e7a0bf9c3d

    • SHA1

      99a98da05215ea31cf1f3a0c6d6ade1569f92189

    • SHA256

      6e36ab60b6e4c35f66858048dd62c85525a284b12983a8ffc19e90600ecef488

    • SHA512

      fd6f0485e4c08ea8fa7b42325f924d1dd67cf80a41b8bd9acdd6320795c3d5ab41d1a1e97d89f713ae46a5cfefb3f92d1182a61f9d27bbe2d0af49caea428ba2

    • SSDEEP

      1536:Wo1J2jmV6wM2N4sZPM5TLyjX+ICKOPy3NIpIg1wb:WoiwH22M5nSPCtPy3m+b

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks