General
-
Target
90d54e4a89873323ddb2cc3526dc70d0_NeikiAnalytics.exe
-
Size
65KB
-
Sample
240518-fghswscf48
-
MD5
90d54e4a89873323ddb2cc3526dc70d0
-
SHA1
1b5cd6356d08efbcfd7c7e491995b5812122d4c5
-
SHA256
53a1983473a0f626ccc0deb30109acc6f8563126a86992ea6af679bd5395be0f
-
SHA512
1ee18dab52f81b81460d578f03b69f883816d4f3b75f137de3c445424f74de85dee365ce399fe9a039fcb9e32c1d4f8fd1cc7e5a5ed972501c4a26dc0f9accd9
-
SSDEEP
1536:jHk1iFwBblsuGIxNlbCYPtfkIe811JJqqBfUxM8aq5jjRjFJJa/:jE1FbquGKlbCYPtn1Lo2gJJe
Static task
static1
Behavioral task
behavioral1
Sample
90d54e4a89873323ddb2cc3526dc70d0_NeikiAnalytics.exe
Resource
win7-20240220-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
90d54e4a89873323ddb2cc3526dc70d0_NeikiAnalytics.exe
-
Size
65KB
-
MD5
90d54e4a89873323ddb2cc3526dc70d0
-
SHA1
1b5cd6356d08efbcfd7c7e491995b5812122d4c5
-
SHA256
53a1983473a0f626ccc0deb30109acc6f8563126a86992ea6af679bd5395be0f
-
SHA512
1ee18dab52f81b81460d578f03b69f883816d4f3b75f137de3c445424f74de85dee365ce399fe9a039fcb9e32c1d4f8fd1cc7e5a5ed972501c4a26dc0f9accd9
-
SSDEEP
1536:jHk1iFwBblsuGIxNlbCYPtfkIe811JJqqBfUxM8aq5jjRjFJJa/:jE1FbquGKlbCYPtn1Lo2gJJe
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3