General
-
Target
58d16dd6109d1ddc16fd5859e9135cb0_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240519-c8naxaed7z
-
MD5
58d16dd6109d1ddc16fd5859e9135cb0
-
SHA1
b68bd7e3adee6218f97261bb1d30de5f89ce6db4
-
SHA256
94fa93dd606301e6fcc63082b7c02c11cb157c320c12ed838995399c2e7d12b0
-
SHA512
776029c8150316a3545806580d3921673b1e05f85acd81c97fec8a51645f0dc17e2848e6c397995599cf04ac70ee8e97b0ab38d41fa69226959ec17cdf247068
-
SSDEEP
3072:F6+PtWBM7/+mlqK+Bzuby5/ELIOom14HRtnVH/o+:F6Yl7jgVJV/ELlom0HV
Static task
static1
Behavioral task
behavioral1
Sample
58d16dd6109d1ddc16fd5859e9135cb0_NeikiAnalytics.dll
Resource
win7-20240419-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
58d16dd6109d1ddc16fd5859e9135cb0_NeikiAnalytics.exe
-
Size
120KB
-
MD5
58d16dd6109d1ddc16fd5859e9135cb0
-
SHA1
b68bd7e3adee6218f97261bb1d30de5f89ce6db4
-
SHA256
94fa93dd606301e6fcc63082b7c02c11cb157c320c12ed838995399c2e7d12b0
-
SHA512
776029c8150316a3545806580d3921673b1e05f85acd81c97fec8a51645f0dc17e2848e6c397995599cf04ac70ee8e97b0ab38d41fa69226959ec17cdf247068
-
SSDEEP
3072:F6+PtWBM7/+mlqK+Bzuby5/ELIOom14HRtnVH/o+:F6Yl7jgVJV/ELlom0HV
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5