General
-
Target
3347ff3675c77b6c5252f878e2a8c310_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240522-qqvtxsdb5x
-
MD5
3347ff3675c77b6c5252f878e2a8c310
-
SHA1
54472d894317ec6589bf6568d9ab6902db773f87
-
SHA256
1cf1f2d73f3211e1cab852a68f42e2de30ee308bf891761fdbcdc752499f7542
-
SHA512
c94061b6cf4ff5966c204c357b1d2e621031f83af3630945ff9d416987b5256318508f001720ac22e25f586a1eaf9f2cfa171c948a7d0117bde274900f10987b
-
SSDEEP
1536:KiqkB0CCLgQR5Y0PoKAykotSRYkTbxqeWbsZJVuzrfOBdl2duQ28Fh7kjhZx9Ak:50dPRp9V7GnTEQADAOYQ28FhkV9Ak
Static task
static1
Behavioral task
behavioral1
Sample
3347ff3675c77b6c5252f878e2a8c310_NeikiAnalytics.dll
Resource
win7-20240419-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
3347ff3675c77b6c5252f878e2a8c310_NeikiAnalytics.exe
-
Size
120KB
-
MD5
3347ff3675c77b6c5252f878e2a8c310
-
SHA1
54472d894317ec6589bf6568d9ab6902db773f87
-
SHA256
1cf1f2d73f3211e1cab852a68f42e2de30ee308bf891761fdbcdc752499f7542
-
SHA512
c94061b6cf4ff5966c204c357b1d2e621031f83af3630945ff9d416987b5256318508f001720ac22e25f586a1eaf9f2cfa171c948a7d0117bde274900f10987b
-
SSDEEP
1536:KiqkB0CCLgQR5Y0PoKAykotSRYkTbxqeWbsZJVuzrfOBdl2duQ28Fh7kjhZx9Ak:50dPRp9V7GnTEQADAOYQ28FhkV9Ak
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5