General
-
Target
f86d44adcd61a9431fdd7e348ce9a990_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240519-vc55ysgd7w
-
MD5
f86d44adcd61a9431fdd7e348ce9a990
-
SHA1
bce1d3a754c193d02234164a5dfd57d9cd0705f6
-
SHA256
098297f43be096fdff853424aa4b5714064a8cd50de4787580109c3ef167712c
-
SHA512
f2615e2cd58b8ba130e35495e6cf4114fa9b196cca6894edd6c160f5a1982c5a07e9c0c36e8afe5280988f3d50ab82feaf0201e11c4d1e6dd0982dd1a9004297
-
SSDEEP
3072:TjW8gYnz+JDjkqePRDvnfBiqUa34wH3t1N:Ty8POkH5Dvom46d
Static task
static1
Behavioral task
behavioral1
Sample
f86d44adcd61a9431fdd7e348ce9a990_NeikiAnalytics.dll
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f86d44adcd61a9431fdd7e348ce9a990_NeikiAnalytics.exe
-
Size
120KB
-
MD5
f86d44adcd61a9431fdd7e348ce9a990
-
SHA1
bce1d3a754c193d02234164a5dfd57d9cd0705f6
-
SHA256
098297f43be096fdff853424aa4b5714064a8cd50de4787580109c3ef167712c
-
SHA512
f2615e2cd58b8ba130e35495e6cf4114fa9b196cca6894edd6c160f5a1982c5a07e9c0c36e8afe5280988f3d50ab82feaf0201e11c4d1e6dd0982dd1a9004297
-
SSDEEP
3072:TjW8gYnz+JDjkqePRDvnfBiqUa34wH3t1N:Ty8POkH5Dvom46d
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5