General
-
Target
284d0434fbc8e8bdf2c3c09da4101c20_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240517-ywh2bagf5z
-
MD5
284d0434fbc8e8bdf2c3c09da4101c20
-
SHA1
bbc254af8a7b704b2545c273883b7bfd2f6b30c1
-
SHA256
41b761b463703c89d731d9f137a39f0d72c4c3a2f15069b04549f251c2b61024
-
SHA512
c3dd631e62ae241e19b970ae5710cb0e24320d49ef817ad68e956cad76f14abdb7f357470423f9b2d99d86e8e9f89e4f814acbc6152b8c772b34269979a9645a
-
SSDEEP
1536:Dxx4J0yPTgdpl7f4wIFd/WqvfcYpkPyWyTSetgs6j0P0LI/8hn:X4J0yOH7f49/cnyWyHz+0qphn
Static task
static1
Behavioral task
behavioral1
Sample
284d0434fbc8e8bdf2c3c09da4101c20_NeikiAnalytics.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
284d0434fbc8e8bdf2c3c09da4101c20_NeikiAnalytics.exe
-
Size
120KB
-
MD5
284d0434fbc8e8bdf2c3c09da4101c20
-
SHA1
bbc254af8a7b704b2545c273883b7bfd2f6b30c1
-
SHA256
41b761b463703c89d731d9f137a39f0d72c4c3a2f15069b04549f251c2b61024
-
SHA512
c3dd631e62ae241e19b970ae5710cb0e24320d49ef817ad68e956cad76f14abdb7f357470423f9b2d99d86e8e9f89e4f814acbc6152b8c772b34269979a9645a
-
SSDEEP
1536:Dxx4J0yPTgdpl7f4wIFd/WqvfcYpkPyWyTSetgs6j0P0LI/8hn:X4J0yOH7f49/cnyWyHz+0qphn
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5