General

  • Target

    8d528af71a18652ddce4834c0d597942_NeikiAnalytics.exe

  • Size

    65KB

  • Sample

    240519-myvmcaeh2w

  • MD5

    8d528af71a18652ddce4834c0d597942

  • SHA1

    bff77fbd012d88bba8c5a8c096199decccf46283

  • SHA256

    5595f0bb3355adbca38d1a951b160cf2250e680ef6984038c962c7b65bd7acdf

  • SHA512

    941d485f28e960ad435456799b7d9970b746f1968978f26d1101d1361ad35aa3dafb12ab0776adb6b5192d37118c23de3760e6a8e1fee685da4f816e1193002b

  • SSDEEP

    1536:lAL6NP5onoClLCZRq2zMPJNhanfRBacn7X5KLiMsOlFiqZQpJU:l9NPJcmZRnoPJjanJBlLoTlFXWJU

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8d528af71a18652ddce4834c0d597942_NeikiAnalytics.exe

    • Size

      65KB

    • MD5

      8d528af71a18652ddce4834c0d597942

    • SHA1

      bff77fbd012d88bba8c5a8c096199decccf46283

    • SHA256

      5595f0bb3355adbca38d1a951b160cf2250e680ef6984038c962c7b65bd7acdf

    • SHA512

      941d485f28e960ad435456799b7d9970b746f1968978f26d1101d1361ad35aa3dafb12ab0776adb6b5192d37118c23de3760e6a8e1fee685da4f816e1193002b

    • SSDEEP

      1536:lAL6NP5onoClLCZRq2zMPJNhanfRBacn7X5KLiMsOlFiqZQpJU:l9NPJcmZRnoPJjanJBlLoTlFXWJU

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks