General

  • Target

    a5e0704bf9815de1aeff5180aa71db20_NeikiAnalytics.exe

  • Size

    97KB

  • Sample

    240520-egyzfabb7x

  • MD5

    a5e0704bf9815de1aeff5180aa71db20

  • SHA1

    ae41e3a2637b4479937f6ea2e6e75e779d04a296

  • SHA256

    c25b4f23cece520c721d701e8aed469d8fe4f1b23bb8642d33f5497adf913244

  • SHA512

    15755bbb276cfe70fc23ce13a848ec31ececba7120615489059edc42525f1a62e898769cfc386fe1b493e137ac23b6efd9ee6adfbb068e5d503cf603ce7b0189

  • SSDEEP

    1536:hoIEVj3cC5n2szz1eX/e7eHx6F0KpjkdLCLcg1ZYQ2Pzx/vl:hoIE9Zn2uzceaRk0K9kdLndFv

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a5e0704bf9815de1aeff5180aa71db20_NeikiAnalytics.exe

    • Size

      97KB

    • MD5

      a5e0704bf9815de1aeff5180aa71db20

    • SHA1

      ae41e3a2637b4479937f6ea2e6e75e779d04a296

    • SHA256

      c25b4f23cece520c721d701e8aed469d8fe4f1b23bb8642d33f5497adf913244

    • SHA512

      15755bbb276cfe70fc23ce13a848ec31ececba7120615489059edc42525f1a62e898769cfc386fe1b493e137ac23b6efd9ee6adfbb068e5d503cf603ce7b0189

    • SSDEEP

      1536:hoIEVj3cC5n2szz1eX/e7eHx6F0KpjkdLCLcg1ZYQ2Pzx/vl:hoIE9Zn2uzceaRk0K9kdLndFv

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks