General
-
Target
e97be288e9d2b250bff407fa3d1790c0_NeikiAnalytics.exe
-
Size
65KB
-
Sample
240517-mlq4dsdh41
-
MD5
e97be288e9d2b250bff407fa3d1790c0
-
SHA1
60a3bfcd67a69444b27bc373731cb7048666549e
-
SHA256
002bdf91632f6f62c2fdfd1e5c4066777856dc2f1c8e08a99ff22bd7adfab82b
-
SHA512
822e6c0c53c51eb6cc3f03190c556b8fc1a3b52846c3af5f1564ad60542d0f02448e79bf35c19092299abfadf6602749955803a55a6531b26b1c057d1b8a9954
-
SSDEEP
1536:Y3rMO3FH455XIQ3oleUXHRvnyBbl/wXjaDxHFPoNj:Y3AO1Y55rFuF8b2aDxlAZ
Static task
static1
Behavioral task
behavioral1
Sample
e97be288e9d2b250bff407fa3d1790c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e97be288e9d2b250bff407fa3d1790c0_NeikiAnalytics.exe
-
Size
65KB
-
MD5
e97be288e9d2b250bff407fa3d1790c0
-
SHA1
60a3bfcd67a69444b27bc373731cb7048666549e
-
SHA256
002bdf91632f6f62c2fdfd1e5c4066777856dc2f1c8e08a99ff22bd7adfab82b
-
SHA512
822e6c0c53c51eb6cc3f03190c556b8fc1a3b52846c3af5f1564ad60542d0f02448e79bf35c19092299abfadf6602749955803a55a6531b26b1c057d1b8a9954
-
SSDEEP
1536:Y3rMO3FH455XIQ3oleUXHRvnyBbl/wXjaDxHFPoNj:Y3AO1Y55rFuF8b2aDxlAZ
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5