General
-
Target
35f3a890d7e3b1a4cb68773ce139af90_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240523-f7n3lafc4z
-
MD5
35f3a890d7e3b1a4cb68773ce139af90
-
SHA1
2144c99316d79531aaff77c0b255f249676d5133
-
SHA256
cdc76301238b085a90312234fb7ab97167f31ca4f6d98a032b31719b63cc2b63
-
SHA512
c27f118f50c1f2739dfd26a363ab4f2521701ad31ed8e6e17d7448c150ed3a7e0ac979874f0829b9138261ed1a97ec523963572b01017685fa2ad8a6df8a8fce
-
SSDEEP
3072:CZvqRQCf/iVrRO6USflAdcJDC+pH05YpxdYITz:CiRQRROJdcm+VcA/Y6z
Static task
static1
Behavioral task
behavioral1
Sample
35f3a890d7e3b1a4cb68773ce139af90_NeikiAnalytics.dll
Resource
win7-20231129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
35f3a890d7e3b1a4cb68773ce139af90_NeikiAnalytics.exe
-
Size
120KB
-
MD5
35f3a890d7e3b1a4cb68773ce139af90
-
SHA1
2144c99316d79531aaff77c0b255f249676d5133
-
SHA256
cdc76301238b085a90312234fb7ab97167f31ca4f6d98a032b31719b63cc2b63
-
SHA512
c27f118f50c1f2739dfd26a363ab4f2521701ad31ed8e6e17d7448c150ed3a7e0ac979874f0829b9138261ed1a97ec523963572b01017685fa2ad8a6df8a8fce
-
SSDEEP
3072:CZvqRQCf/iVrRO6USflAdcJDC+pH05YpxdYITz:CiRQRROJdcm+VcA/Y6z
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5