General

  • Target

    62c47c11477bd1a801f99e0db55a2240_NeikiAnalytics.exe

  • Size

    65KB

  • Sample

    240519-3war6ahf25

  • MD5

    62c47c11477bd1a801f99e0db55a2240

  • SHA1

    65c4b4223a98fe566764fc406552c393f94c0385

  • SHA256

    d4755acbd8b2c8419902d49c7e5bef7af7bdf85afcd794bf4becd9c9a2fbe73f

  • SHA512

    b2bafff19ea2563f5e600458603ae2fc75b00a013f0aa4b96775f58cff83d1542a990fc9cfb3079622f25c84d019ba786dae3e6f400bd700e3c8f5f304f334b8

  • SSDEEP

    1536:fM+8ds+4UhFgPpU7d1psw3IUQP6IuINGrmmhw4YHQ2aOA:WJsS1+vTu3hw4Yw2aP

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      62c47c11477bd1a801f99e0db55a2240_NeikiAnalytics.exe

    • Size

      65KB

    • MD5

      62c47c11477bd1a801f99e0db55a2240

    • SHA1

      65c4b4223a98fe566764fc406552c393f94c0385

    • SHA256

      d4755acbd8b2c8419902d49c7e5bef7af7bdf85afcd794bf4becd9c9a2fbe73f

    • SHA512

      b2bafff19ea2563f5e600458603ae2fc75b00a013f0aa4b96775f58cff83d1542a990fc9cfb3079622f25c84d019ba786dae3e6f400bd700e3c8f5f304f334b8

    • SSDEEP

      1536:fM+8ds+4UhFgPpU7d1psw3IUQP6IuINGrmmhw4YHQ2aOA:WJsS1+vTu3hw4Yw2aP

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks