General

  • Target

    e29596c87bece3c26cf8c8e0e768bcc0_NeikiAnalytics.exe

  • Size

    1.4MB

  • Sample

    240517-ks16tsaf42

  • MD5

    e29596c87bece3c26cf8c8e0e768bcc0

  • SHA1

    0aa46000e5b9200e441246c0628b69d0727a0a72

  • SHA256

    efaca9be3f27a1b370e45cef80d8edf805b5df41e29dcbfb41066d09e3efbfb8

  • SHA512

    c35cd30ba9f423235155d4a6679ad1055aa393cf5efbc34a3b49d14841caa084ef8dcb8941857e199901c0637b60c3f0c7aab74195d0c5b29e39f010b3ad7ad1

  • SSDEEP

    24576:rsFRhoq8oLxlGuzAGKFDuXNR2TGxTEcuC+/Kt+/:Syo3xKFDuXA2TTc/48

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e29596c87bece3c26cf8c8e0e768bcc0_NeikiAnalytics.exe

    • Size

      1.4MB

    • MD5

      e29596c87bece3c26cf8c8e0e768bcc0

    • SHA1

      0aa46000e5b9200e441246c0628b69d0727a0a72

    • SHA256

      efaca9be3f27a1b370e45cef80d8edf805b5df41e29dcbfb41066d09e3efbfb8

    • SHA512

      c35cd30ba9f423235155d4a6679ad1055aa393cf5efbc34a3b49d14841caa084ef8dcb8941857e199901c0637b60c3f0c7aab74195d0c5b29e39f010b3ad7ad1

    • SSDEEP

      24576:rsFRhoq8oLxlGuzAGKFDuXNR2TGxTEcuC+/Kt+/:Syo3xKFDuXA2TTc/48

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks