General
-
Target
3eafc62984702e015db77e1df30e2950_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240518-ypeqbacg2v
-
MD5
3eafc62984702e015db77e1df30e2950
-
SHA1
69725258c0e82c8ed41baaad2810ff07d7a85624
-
SHA256
469c03431549dba4a3a49ba65abb6de71e9c191aa600d635791ac795379e89d9
-
SHA512
0957d8c155ada6853879e57f4fb8fd1d68516bdb12725c88a4503dc6a681e14e64d20221764833f08debee334199e52a660a7c98057951c88f2c2eb8805c6af0
-
SSDEEP
3072:ep3SeK8uYK+/AxdlPUwZa2awNnCSsqk3sh7MiVrT8N0W:0YYKBxdlBLNCrqkUVen
Static task
static1
Behavioral task
behavioral1
Sample
3eafc62984702e015db77e1df30e2950_NeikiAnalytics.dll
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
3eafc62984702e015db77e1df30e2950_NeikiAnalytics.exe
-
Size
120KB
-
MD5
3eafc62984702e015db77e1df30e2950
-
SHA1
69725258c0e82c8ed41baaad2810ff07d7a85624
-
SHA256
469c03431549dba4a3a49ba65abb6de71e9c191aa600d635791ac795379e89d9
-
SHA512
0957d8c155ada6853879e57f4fb8fd1d68516bdb12725c88a4503dc6a681e14e64d20221764833f08debee334199e52a660a7c98057951c88f2c2eb8805c6af0
-
SSDEEP
3072:ep3SeK8uYK+/AxdlPUwZa2awNnCSsqk3sh7MiVrT8N0W:0YYKBxdlBLNCrqkUVen
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5