General
-
Target
804b60dd9f9550732b45812d564473e0_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240519-f1tphacd38
-
MD5
804b60dd9f9550732b45812d564473e0
-
SHA1
5d074cd1e5b29586987884f3f55f4e16acd83f3e
-
SHA256
46c8fdb6c4491dae3ba1c61d8a94cd2839403badcbe17270816a7dc867225b5f
-
SHA512
cea59b2ed3143c7bdf10aa60de0cb5df817adf303ae33e663a0a4acf3a4680d633e1d9fb844cf1bc9a9e916c648224dcea2962adb1b6f773637c0883b62c83d3
-
SSDEEP
1536:UacGCOAmIswLGUlp66XOulwxISbCr0bpSC3M62gMk8O2b8BMFvWYtRtui:E2APL97XOIwxpDbp4xFeQu
Static task
static1
Behavioral task
behavioral1
Sample
804b60dd9f9550732b45812d564473e0_NeikiAnalytics.dll
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
804b60dd9f9550732b45812d564473e0_NeikiAnalytics.exe
-
Size
120KB
-
MD5
804b60dd9f9550732b45812d564473e0
-
SHA1
5d074cd1e5b29586987884f3f55f4e16acd83f3e
-
SHA256
46c8fdb6c4491dae3ba1c61d8a94cd2839403badcbe17270816a7dc867225b5f
-
SHA512
cea59b2ed3143c7bdf10aa60de0cb5df817adf303ae33e663a0a4acf3a4680d633e1d9fb844cf1bc9a9e916c648224dcea2962adb1b6f773637c0883b62c83d3
-
SSDEEP
1536:UacGCOAmIswLGUlp66XOulwxISbCr0bpSC3M62gMk8O2b8BMFvWYtRtui:E2APL97XOIwxpDbp4xFeQu
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5