General
-
Target
81eaf7d9d1d19f1f8f5b15bc30de6dd0_NeikiAnalytics.exe
-
Size
65KB
-
Sample
240523-dybpsscb4w
-
MD5
81eaf7d9d1d19f1f8f5b15bc30de6dd0
-
SHA1
5828d0db1360b2d9bf409e1d155d866e8cf04a2f
-
SHA256
8935904b5c553dad1a0f0f8ee9d232ca828fd3bff09ae0f8a423d3ab11b20512
-
SHA512
934bb425b4c2d32851f9a25f4497537ca37ff1e039266b796f8d481e53d3fd2bee6cf58e0a7b2537c17c412dcec3609bf4d16959b8e821ea3574aab10daebef8
-
SSDEEP
1536:hB18SmmqZ9yOW+R9IcjGaYu7Fj4lRE1IMQ39zvm8oHi1nR:p8Smmql9R9IcjMu7Fj4lRmP2vm8D
Static task
static1
Behavioral task
behavioral1
Sample
81eaf7d9d1d19f1f8f5b15bc30de6dd0_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
81eaf7d9d1d19f1f8f5b15bc30de6dd0_NeikiAnalytics.exe
-
Size
65KB
-
MD5
81eaf7d9d1d19f1f8f5b15bc30de6dd0
-
SHA1
5828d0db1360b2d9bf409e1d155d866e8cf04a2f
-
SHA256
8935904b5c553dad1a0f0f8ee9d232ca828fd3bff09ae0f8a423d3ab11b20512
-
SHA512
934bb425b4c2d32851f9a25f4497537ca37ff1e039266b796f8d481e53d3fd2bee6cf58e0a7b2537c17c412dcec3609bf4d16959b8e821ea3574aab10daebef8
-
SSDEEP
1536:hB18SmmqZ9yOW+R9IcjGaYu7Fj4lRE1IMQ39zvm8oHi1nR:p8Smmql9R9IcjMu7Fj4lRmP2vm8D
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5