General
-
Target
6999f3ff092785abe3b1dcdf3cb85860_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240518-bqn9tadd2w
-
MD5
6999f3ff092785abe3b1dcdf3cb85860
-
SHA1
2e167b872fc78b0021840cb7517a7c482978f6ca
-
SHA256
0dc800260fe842781a5c99c90cc1e0e01743960e09717201c8eafe7ad76f4c3c
-
SHA512
e432ae4c88b069f2f3f2c3eeb39992b5b91fa5b171e82786674b922b3db0012e24a077e71d12f63235615e70ea747dbb6d189db0245ab3941e35f29aae443ab3
-
SSDEEP
1536:evryDKeQr6NwD1RJa7AAGqefixu9FRNQQbIpCQyT+XY0bLj6kU4Kh1ver3iOpOM:ejyOF6uD1RU2MsFxOo0PjAxW7iOg
Static task
static1
Behavioral task
behavioral1
Sample
6999f3ff092785abe3b1dcdf3cb85860_NeikiAnalytics.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6999f3ff092785abe3b1dcdf3cb85860_NeikiAnalytics.exe
-
Size
120KB
-
MD5
6999f3ff092785abe3b1dcdf3cb85860
-
SHA1
2e167b872fc78b0021840cb7517a7c482978f6ca
-
SHA256
0dc800260fe842781a5c99c90cc1e0e01743960e09717201c8eafe7ad76f4c3c
-
SHA512
e432ae4c88b069f2f3f2c3eeb39992b5b91fa5b171e82786674b922b3db0012e24a077e71d12f63235615e70ea747dbb6d189db0245ab3941e35f29aae443ab3
-
SSDEEP
1536:evryDKeQr6NwD1RJa7AAGqefixu9FRNQQbIpCQyT+XY0bLj6kU4Kh1ver3iOpOM:ejyOF6uD1RU2MsFxOo0PjAxW7iOg
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5