General
-
Target
37a8422d2b7e1e7709518a1c73c88b40_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240517-z9xx3abg51
-
MD5
37a8422d2b7e1e7709518a1c73c88b40
-
SHA1
883fb36e38caf2f990513300f7177bafc6190f2d
-
SHA256
f00bbb6299643284cdf0d16e9d47dc79e83399d957018aafbd2432004ad8e33c
-
SHA512
4b36ad1c62fa726c4477de606831378ccb6cae9c18dd0b0104c5d8d213a4dc6a316238d01f9cb4f4c46ad8a745fde0fe393f4732080e83b374d02e1ba60de8a2
-
SSDEEP
3072:SJaeXpw8Tgw/K02UA1H+6APMo2lHrPbUU:SJaCp1TNp2lP4MoGLAU
Static task
static1
Behavioral task
behavioral1
Sample
37a8422d2b7e1e7709518a1c73c88b40_NeikiAnalytics.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
37a8422d2b7e1e7709518a1c73c88b40_NeikiAnalytics.exe
-
Size
120KB
-
MD5
37a8422d2b7e1e7709518a1c73c88b40
-
SHA1
883fb36e38caf2f990513300f7177bafc6190f2d
-
SHA256
f00bbb6299643284cdf0d16e9d47dc79e83399d957018aafbd2432004ad8e33c
-
SHA512
4b36ad1c62fa726c4477de606831378ccb6cae9c18dd0b0104c5d8d213a4dc6a316238d01f9cb4f4c46ad8a745fde0fe393f4732080e83b374d02e1ba60de8a2
-
SSDEEP
3072:SJaeXpw8Tgw/K02UA1H+6APMo2lHrPbUU:SJaCp1TNp2lP4MoGLAU
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5