General
-
Target
0b76861c541b49745b9bf714a0bdd660_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240518-1sewlaab83
-
MD5
0b76861c541b49745b9bf714a0bdd660
-
SHA1
ae8b3827e7f57bc4a2afc32acac6b6326ba7293b
-
SHA256
a68ff706938fc2c3006b6829b4a3addfb69bfb89252811da70555b944041f06f
-
SHA512
baea0abd643accb0f947538222a76712bf8f67034e96c7b2ae47289bb6f811874a42a7562caf38f75a9913466e07fce785c0c5f58838943b3385a05624f4c9ce
-
SSDEEP
1536:X5VTYSacOZmA1Ah8OkJUNUhk/4mzg7i0Xj3NaEFbTB7TReM/urdvlEi9hv/:X5VTyZlAiRJyY7Vj9aax71eMGrHEAn
Static task
static1
Behavioral task
behavioral1
Sample
0b76861c541b49745b9bf714a0bdd660_NeikiAnalytics.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0b76861c541b49745b9bf714a0bdd660_NeikiAnalytics.exe
-
Size
120KB
-
MD5
0b76861c541b49745b9bf714a0bdd660
-
SHA1
ae8b3827e7f57bc4a2afc32acac6b6326ba7293b
-
SHA256
a68ff706938fc2c3006b6829b4a3addfb69bfb89252811da70555b944041f06f
-
SHA512
baea0abd643accb0f947538222a76712bf8f67034e96c7b2ae47289bb6f811874a42a7562caf38f75a9913466e07fce785c0c5f58838943b3385a05624f4c9ce
-
SSDEEP
1536:X5VTYSacOZmA1Ah8OkJUNUhk/4mzg7i0Xj3NaEFbTB7TReM/urdvlEi9hv/:X5VTyZlAiRJyY7Vj9aax71eMGrHEAn
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5