General
-
Target
ddad279d01dabf48c8c603477a0ae7b0_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240519-sfnc7sce4w
-
MD5
ddad279d01dabf48c8c603477a0ae7b0
-
SHA1
66832b4f70690d528e30b066ac866359b5335aa7
-
SHA256
77aa4751d6882f85fdca2c808ac3d00d4921678e91ee1678f7d25fd52b3fb9c6
-
SHA512
fe61f97586d8625fbdeb6325e1eab88d00eb686aa9128c528133eebc8710fb52aecc004ba9ace5f798f4945c115930c435df389420a89e5cc5f6efcd54e493e6
-
SSDEEP
1536:5rQtKCvWeoacxmdw0paeIWO1JsDVA3C6uecqs5PmT4c2SddM+qUHtASUzAj:hQtKCUa0Mj9OjAVZ6uHmT47QdRADm
Static task
static1
Behavioral task
behavioral1
Sample
ddad279d01dabf48c8c603477a0ae7b0_NeikiAnalytics.dll
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ddad279d01dabf48c8c603477a0ae7b0_NeikiAnalytics.exe
-
Size
120KB
-
MD5
ddad279d01dabf48c8c603477a0ae7b0
-
SHA1
66832b4f70690d528e30b066ac866359b5335aa7
-
SHA256
77aa4751d6882f85fdca2c808ac3d00d4921678e91ee1678f7d25fd52b3fb9c6
-
SHA512
fe61f97586d8625fbdeb6325e1eab88d00eb686aa9128c528133eebc8710fb52aecc004ba9ace5f798f4945c115930c435df389420a89e5cc5f6efcd54e493e6
-
SSDEEP
1536:5rQtKCvWeoacxmdw0paeIWO1JsDVA3C6uecqs5PmT4c2SddM+qUHtASUzAj:hQtKCUa0Mj9OjAVZ6uHmT47QdRADm
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5