General
-
Target
3efa4ca4720c0da820ee6a50438e5010_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240519-bkq68aad5s
-
MD5
3efa4ca4720c0da820ee6a50438e5010
-
SHA1
64e144eb762bb8d6d45c69f4006efd31b105c687
-
SHA256
e2010219610aedfa8d24edfd72a4c0675ac4d63088dc190e0d3f7bedb8ca57f2
-
SHA512
3c7408302e4020765f2b064634bc63c245fe02116b91de325d5eddb510e353dbce2a50909ac0e235d96449c23d6b0c05c86a0655c2c7c8e6f66d09ce47c3573f
-
SSDEEP
1536:3+2hbYEyuHC5K/GvO8Qq5KtlNQ4BrGIRlxKxPWzRJK9NreATm:CEy2+28QukNQ4RGIRlDRJK9N8
Static task
static1
Behavioral task
behavioral1
Sample
3efa4ca4720c0da820ee6a50438e5010_NeikiAnalytics.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
3efa4ca4720c0da820ee6a50438e5010_NeikiAnalytics.exe
-
Size
120KB
-
MD5
3efa4ca4720c0da820ee6a50438e5010
-
SHA1
64e144eb762bb8d6d45c69f4006efd31b105c687
-
SHA256
e2010219610aedfa8d24edfd72a4c0675ac4d63088dc190e0d3f7bedb8ca57f2
-
SHA512
3c7408302e4020765f2b064634bc63c245fe02116b91de325d5eddb510e353dbce2a50909ac0e235d96449c23d6b0c05c86a0655c2c7c8e6f66d09ce47c3573f
-
SSDEEP
1536:3+2hbYEyuHC5K/GvO8Qq5KtlNQ4BrGIRlxKxPWzRJK9NreATm:CEy2+28QukNQ4RGIRlDRJK9N8
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5