General
-
Target
0aa5a7cf32dcbed0f91c9ba8c25ee210_NeikiAnalytics.exe
-
Size
97KB
-
Sample
240521-zg9q6ahh4v
-
MD5
0aa5a7cf32dcbed0f91c9ba8c25ee210
-
SHA1
942b139d6563d13d06386166f41bc78820f7d9af
-
SHA256
e829ffc0158cba7546551e92733a8fc7776c1776470afa447c9b690e4a62efc4
-
SHA512
85d7d7d2319f13f766f13af7e5474cd47ca7c76a44d2f4e328230d856da9cbc1799200a0086be4041d1438410db2e50615f252917c5725a70909452ebb6c193f
-
SSDEEP
3072:/Wq3hk7s7oK+gJQWHMMF6q7IBkaLqyx1:+T4MK+8V7ekaD
Static task
static1
Behavioral task
behavioral1
Sample
0aa5a7cf32dcbed0f91c9ba8c25ee210_NeikiAnalytics.exe
Resource
win7-20240419-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0aa5a7cf32dcbed0f91c9ba8c25ee210_NeikiAnalytics.exe
-
Size
97KB
-
MD5
0aa5a7cf32dcbed0f91c9ba8c25ee210
-
SHA1
942b139d6563d13d06386166f41bc78820f7d9af
-
SHA256
e829ffc0158cba7546551e92733a8fc7776c1776470afa447c9b690e4a62efc4
-
SHA512
85d7d7d2319f13f766f13af7e5474cd47ca7c76a44d2f4e328230d856da9cbc1799200a0086be4041d1438410db2e50615f252917c5725a70909452ebb6c193f
-
SSDEEP
3072:/Wq3hk7s7oK+gJQWHMMF6q7IBkaLqyx1:+T4MK+8V7ekaD
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5