General
-
Target
25d030d5e203893aad22308dbbd92130_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240517-yngtaagb4w
-
MD5
25d030d5e203893aad22308dbbd92130
-
SHA1
cb1006e704214d2f10d77e13bea5dd978ccc633d
-
SHA256
39083e8033ea17b2ae38b101fff705d2d7edcaa194cf008e6784ea7181e34d2f
-
SHA512
422c80e92e073df6f0bf28a5d18806743d0c06bab5d4871139d36df1f0d90c821e5df8ff63b7fab749b687bee9d80ff18d568f89265442c63730795f09ef5690
-
SSDEEP
3072:NZGkwlX2edTqFY2bOOB2hLhfXHijVRE0Xu3P:ekKmSq5OmKIps
Static task
static1
Behavioral task
behavioral1
Sample
25d030d5e203893aad22308dbbd92130_NeikiAnalytics.dll
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
25d030d5e203893aad22308dbbd92130_NeikiAnalytics.exe
-
Size
120KB
-
MD5
25d030d5e203893aad22308dbbd92130
-
SHA1
cb1006e704214d2f10d77e13bea5dd978ccc633d
-
SHA256
39083e8033ea17b2ae38b101fff705d2d7edcaa194cf008e6784ea7181e34d2f
-
SHA512
422c80e92e073df6f0bf28a5d18806743d0c06bab5d4871139d36df1f0d90c821e5df8ff63b7fab749b687bee9d80ff18d568f89265442c63730795f09ef5690
-
SSDEEP
3072:NZGkwlX2edTqFY2bOOB2hLhfXHijVRE0Xu3P:ekKmSq5OmKIps
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5