General
-
Target
25cdb762aacb20f18b3130d2568f9ce800686af97dc26e22c1995e055d1beeec_NeikiAnalytics
-
Size
97KB
-
Sample
240521-ks4lysfd7w
-
MD5
902beb1d16a9b21153914d602868ee80
-
SHA1
682e334ffa7624965b1b9cdd134090b458132c67
-
SHA256
25cdb762aacb20f18b3130d2568f9ce800686af97dc26e22c1995e055d1beeec
-
SHA512
83af3a6e51b0f5781fadf94d3a8c40c441b09144e008acaef291eea51a0d952cb17f680b94160514d48717238285eae2a1185e16d56bce7ba166613b77c1dc07
-
SSDEEP
1536:7NRmZsQnY/6X/f1BnhyKXxm4q9rwkzEUJeR/qte1FQbiiBcSXlqB5rJCn:XQn7XFBnh1DulzEUYR/qKF5/SIbJCn
Static task
static1
Behavioral task
behavioral1
Sample
25cdb762aacb20f18b3130d2568f9ce800686af97dc26e22c1995e055d1beeec_NeikiAnalytics.exe
Resource
win7-20240419-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
25cdb762aacb20f18b3130d2568f9ce800686af97dc26e22c1995e055d1beeec_NeikiAnalytics
-
Size
97KB
-
MD5
902beb1d16a9b21153914d602868ee80
-
SHA1
682e334ffa7624965b1b9cdd134090b458132c67
-
SHA256
25cdb762aacb20f18b3130d2568f9ce800686af97dc26e22c1995e055d1beeec
-
SHA512
83af3a6e51b0f5781fadf94d3a8c40c441b09144e008acaef291eea51a0d952cb17f680b94160514d48717238285eae2a1185e16d56bce7ba166613b77c1dc07
-
SSDEEP
1536:7NRmZsQnY/6X/f1BnhyKXxm4q9rwkzEUJeR/qte1FQbiiBcSXlqB5rJCn:XQn7XFBnh1DulzEUYR/qKF5/SIbJCn
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3