General
-
Target
5d474feac1117f7231ede9e2eb5c8490_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240522-3zy9xsdh6y
-
MD5
5d474feac1117f7231ede9e2eb5c8490
-
SHA1
0a9271a9e5530837ec0ea0102508d6c0eef0e7fd
-
SHA256
f7c73c5c22e2f66edd16975f69c6cdc7a50e166e6a4fdaa82c780a83d3048afb
-
SHA512
f7079e4501a1141511156d714cc4190905a2986f76e3b00344602057c336dfaa00e85582ae315c667a2c38a5bf49675ac8005449a4e40cfb4b6f99849b34be2f
-
SSDEEP
1536:A43OHt+Jq8kbq74LtwGTV/P9lIru+irDYeb7ugGSH6IDtU6eVjP4LbtGqd0I7/:ADHtBLtwGvl7N/YqugGiDtUJP4LbYQn
Static task
static1
Behavioral task
behavioral1
Sample
5d474feac1117f7231ede9e2eb5c8490_NeikiAnalytics.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5d474feac1117f7231ede9e2eb5c8490_NeikiAnalytics.exe
-
Size
120KB
-
MD5
5d474feac1117f7231ede9e2eb5c8490
-
SHA1
0a9271a9e5530837ec0ea0102508d6c0eef0e7fd
-
SHA256
f7c73c5c22e2f66edd16975f69c6cdc7a50e166e6a4fdaa82c780a83d3048afb
-
SHA512
f7079e4501a1141511156d714cc4190905a2986f76e3b00344602057c336dfaa00e85582ae315c667a2c38a5bf49675ac8005449a4e40cfb4b6f99849b34be2f
-
SSDEEP
1536:A43OHt+Jq8kbq74LtwGTV/P9lIru+irDYeb7ugGSH6IDtU6eVjP4LbtGqd0I7/:ADHtBLtwGvl7N/YqugGiDtUJP4LbYQn
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5