General

  • Target

    7b8e2c3be7ca6a5de5cc4c2fc3744260_NeikiAnalytics.exe

  • Size

    120KB

  • Sample

    240523-dah4zabd45

  • MD5

    7b8e2c3be7ca6a5de5cc4c2fc3744260

  • SHA1

    4e184f699458fcc239ceb8fcc827e9fd5f2954ea

  • SHA256

    8b763eaab8f99e446deaedc11a57c95dd1b3baa2a00ddf4c0a1367381e80721d

  • SHA512

    6687a63f1b6957cf8a50310d426f52e2a093acfc17ec00f1143392c6431a7a8cd9eeaa8b689182557899819e9da7b79938d8844578954106d98db49b8301ea35

  • SSDEEP

    1536:NE1p75qnqe5eHKPexupfTUIFUoFK/f/5687B/nPffJemPqIsNgsmLz/KgbP:E5q6HYe4pwoUX88VngJgsmLz/KgbP

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      7b8e2c3be7ca6a5de5cc4c2fc3744260_NeikiAnalytics.exe

    • Size

      120KB

    • MD5

      7b8e2c3be7ca6a5de5cc4c2fc3744260

    • SHA1

      4e184f699458fcc239ceb8fcc827e9fd5f2954ea

    • SHA256

      8b763eaab8f99e446deaedc11a57c95dd1b3baa2a00ddf4c0a1367381e80721d

    • SHA512

      6687a63f1b6957cf8a50310d426f52e2a093acfc17ec00f1143392c6431a7a8cd9eeaa8b689182557899819e9da7b79938d8844578954106d98db49b8301ea35

    • SSDEEP

      1536:NE1p75qnqe5eHKPexupfTUIFUoFK/f/5687B/nPffJemPqIsNgsmLz/KgbP:E5q6HYe4pwoUX88VngJgsmLz/KgbP

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks