General

  • Target

    496fad4459c52e9f7c7ffe378469f560_NeikiAnalytics.exe

  • Size

    120KB

  • Sample

    240522-148m2sah86

  • MD5

    496fad4459c52e9f7c7ffe378469f560

  • SHA1

    6ad11aaadb260e369e1d12bd5305a8e75546e927

  • SHA256

    4054c5abfa746ad538f94202fdbea55ce823eb6f35f5e728c8d6653391a6eacd

  • SHA512

    1f1c13bf44673cf4b5b95ebaa9f662aabfaae65edd2f363b0cb1b876309a1f616e3d53f0c7290aaa265d1f68a6f96d195e4ce7fe4ab2ff983475e341165fea71

  • SSDEEP

    1536:ikjcmHs0bRXGf/650ScnMmvEM3sL3E7nmHziA8zvG1omuRyOnJNFFT:ik4iscs/6TcTsssoOizuOpXvl

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      496fad4459c52e9f7c7ffe378469f560_NeikiAnalytics.exe

    • Size

      120KB

    • MD5

      496fad4459c52e9f7c7ffe378469f560

    • SHA1

      6ad11aaadb260e369e1d12bd5305a8e75546e927

    • SHA256

      4054c5abfa746ad538f94202fdbea55ce823eb6f35f5e728c8d6653391a6eacd

    • SHA512

      1f1c13bf44673cf4b5b95ebaa9f662aabfaae65edd2f363b0cb1b876309a1f616e3d53f0c7290aaa265d1f68a6f96d195e4ce7fe4ab2ff983475e341165fea71

    • SSDEEP

      1536:ikjcmHs0bRXGf/650ScnMmvEM3sL3E7nmHziA8zvG1omuRyOnJNFFT:ik4iscs/6TcTsssoOizuOpXvl

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks