General
-
Target
a580e1e6b00f6b0d127408ce2e9fd220_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240519-jpwaqshd2y
-
MD5
a580e1e6b00f6b0d127408ce2e9fd220
-
SHA1
ee68442035b281aa3d069afbdb2d2d52c50b64b3
-
SHA256
7d3a81b9553a05e725d9843b309ef4af63540fb7850b52d2f98b0d89960e7883
-
SHA512
33043e968b44ba757413dc58a5b7c43c099163db4db3bb0a9d14d081d01f446a4ce2f2f0e5fe8110e847ff50c968aa09f385776f201fba2868cbb57bb8415e37
-
SSDEEP
3072:BYnteXpLl9W0yV9UOboiOCqNfFxZgfkPG/zhdOD2+:BMeXkrbroFxZgMPGrSDr
Static task
static1
Behavioral task
behavioral1
Sample
a580e1e6b00f6b0d127408ce2e9fd220_NeikiAnalytics.dll
Resource
win7-20240220-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a580e1e6b00f6b0d127408ce2e9fd220_NeikiAnalytics.exe
-
Size
120KB
-
MD5
a580e1e6b00f6b0d127408ce2e9fd220
-
SHA1
ee68442035b281aa3d069afbdb2d2d52c50b64b3
-
SHA256
7d3a81b9553a05e725d9843b309ef4af63540fb7850b52d2f98b0d89960e7883
-
SHA512
33043e968b44ba757413dc58a5b7c43c099163db4db3bb0a9d14d081d01f446a4ce2f2f0e5fe8110e847ff50c968aa09f385776f201fba2868cbb57bb8415e37
-
SSDEEP
3072:BYnteXpLl9W0yV9UOboiOCqNfFxZgfkPG/zhdOD2+:BMeXkrbroFxZgMPGrSDr
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5