General

  • Target

    8951b3e0a23ec95f9f7a0c278444e490_NeikiAnalytics.exe

  • Size

    65KB

  • Sample

    240519-gmz5ssdd7z

  • MD5

    8951b3e0a23ec95f9f7a0c278444e490

  • SHA1

    5b47371f8bc87e2b735c9a1ebfd95841a18f7a54

  • SHA256

    7dd6b7f12b15bd74e9f0b8682f07f0ae20c488f1bbb6b252409ed60870762aa1

  • SHA512

    cbadbd7b623f72724c6f32c0fc4c667c3246836544ca46fb290a7601176dbac1e8a9eb467401bf7841cdd74283f27a8d4975cdf4d046fae2b32e47074a845195

  • SSDEEP

    1536:MOGtfIvMTC+GiGB8pgqxTmPhOgABAbvQY8:MOGSrB8pxToh1dW

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8951b3e0a23ec95f9f7a0c278444e490_NeikiAnalytics.exe

    • Size

      65KB

    • MD5

      8951b3e0a23ec95f9f7a0c278444e490

    • SHA1

      5b47371f8bc87e2b735c9a1ebfd95841a18f7a54

    • SHA256

      7dd6b7f12b15bd74e9f0b8682f07f0ae20c488f1bbb6b252409ed60870762aa1

    • SHA512

      cbadbd7b623f72724c6f32c0fc4c667c3246836544ca46fb290a7601176dbac1e8a9eb467401bf7841cdd74283f27a8d4975cdf4d046fae2b32e47074a845195

    • SSDEEP

      1536:MOGtfIvMTC+GiGB8pgqxTmPhOgABAbvQY8:MOGSrB8pxToh1dW

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Modify Registry

5
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks