General

  • Target

    12a0b5a692079ef80e1f4dc6236e2c30_NeikiAnalytics.exe

  • Size

    97KB

  • Sample

    240517-wh19mabe42

  • MD5

    12a0b5a692079ef80e1f4dc6236e2c30

  • SHA1

    65b8d5574e44610b5e14e7f59d1b69bf244e25f2

  • SHA256

    90e7d5a6aaa3334f62e85c0719ed33254d5ea0057385b0848b708c03abf8ac02

  • SHA512

    2e64883a9ad711e1582f9f8f3b376e6fff75200e16e1289b82bfeef79d38c2220ba7cd4ce36f84fa14b3f83caf4492e211efb03dd10b9a2f943d454989679714

  • SSDEEP

    1536:ahIxMHoZIh2R9uHWZoifwLXIsk/tjwNqJWib6pTu4xOt9tsaCTqQt1L:aqxM+IBHWZ3EX3kljw40ibgTuFvCW

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      12a0b5a692079ef80e1f4dc6236e2c30_NeikiAnalytics.exe

    • Size

      97KB

    • MD5

      12a0b5a692079ef80e1f4dc6236e2c30

    • SHA1

      65b8d5574e44610b5e14e7f59d1b69bf244e25f2

    • SHA256

      90e7d5a6aaa3334f62e85c0719ed33254d5ea0057385b0848b708c03abf8ac02

    • SHA512

      2e64883a9ad711e1582f9f8f3b376e6fff75200e16e1289b82bfeef79d38c2220ba7cd4ce36f84fa14b3f83caf4492e211efb03dd10b9a2f943d454989679714

    • SSDEEP

      1536:ahIxMHoZIh2R9uHWZoifwLXIsk/tjwNqJWib6pTu4xOt9tsaCTqQt1L:aqxM+IBHWZ3EX3kljw40ibgTuFvCW

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks