General
-
Target
0df91ead400b84d5ed08afb1342b2f60_NeikiAnalytics.exe
-
Size
65KB
-
Sample
240521-zqwkwsab88
-
MD5
0df91ead400b84d5ed08afb1342b2f60
-
SHA1
4fd1a4b178566a66d06a8de79924136ffb43d2db
-
SHA256
fc51b9c6e51e5fd92c85d9076d34461a3446236466ba3b136e1e07e2ef721548
-
SHA512
87dd66dcbd451e3d0d96f37be7a800b846f61a55c46329771f7164dcc55ea59b83c1222c1520d5975e3414325f442ba209d68acd8f770a51ca83f4311c4c5b1b
-
SSDEEP
1536:uOxfv2pKokB3GmvkKdNruvUiKa5GqWKLxFpZUv8oai:uOZv+Kb5dNBi95tdBq8oai
Static task
static1
Behavioral task
behavioral1
Sample
0df91ead400b84d5ed08afb1342b2f60_NeikiAnalytics.exe
Resource
win7-20231129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0df91ead400b84d5ed08afb1342b2f60_NeikiAnalytics.exe
-
Size
65KB
-
MD5
0df91ead400b84d5ed08afb1342b2f60
-
SHA1
4fd1a4b178566a66d06a8de79924136ffb43d2db
-
SHA256
fc51b9c6e51e5fd92c85d9076d34461a3446236466ba3b136e1e07e2ef721548
-
SHA512
87dd66dcbd451e3d0d96f37be7a800b846f61a55c46329771f7164dcc55ea59b83c1222c1520d5975e3414325f442ba209d68acd8f770a51ca83f4311c4c5b1b
-
SSDEEP
1536:uOxfv2pKokB3GmvkKdNruvUiKa5GqWKLxFpZUv8oai:uOZv+Kb5dNBi95tdBq8oai
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5