General
-
Target
e5e45a55f6a8b2b63d0265cc715210d0_NeikiAnalytics.exe
-
Size
1.8MB
-
Sample
240523-g9429sgd8t
-
MD5
e5e45a55f6a8b2b63d0265cc715210d0
-
SHA1
097a8c59ba7f7a7829fe51b8b02c475435ae5364
-
SHA256
d0d5c037c5738e95289d2b6454286a507961b6bc954388e89a282c6102b78092
-
SHA512
bfba4d0e647d2eb73e21d1e263d31992948eae121d868970daf77614eac0345dd1461cf3491284ed140ead11dbffd2741697c7c9f084ff6d29ab4f2a852adeaa
-
SSDEEP
49152:xWixbpVndRcpfqwYO3u2XoKNLlMDEe/pmVS/F0jQU:xXdnfnwp3oOLuB/3/uQU
Static task
static1
Behavioral task
behavioral1
Sample
e5e45a55f6a8b2b63d0265cc715210d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e5e45a55f6a8b2b63d0265cc715210d0_NeikiAnalytics.exe
-
Size
1.8MB
-
MD5
e5e45a55f6a8b2b63d0265cc715210d0
-
SHA1
097a8c59ba7f7a7829fe51b8b02c475435ae5364
-
SHA256
d0d5c037c5738e95289d2b6454286a507961b6bc954388e89a282c6102b78092
-
SHA512
bfba4d0e647d2eb73e21d1e263d31992948eae121d868970daf77614eac0345dd1461cf3491284ed140ead11dbffd2741697c7c9f084ff6d29ab4f2a852adeaa
-
SSDEEP
49152:xWixbpVndRcpfqwYO3u2XoKNLlMDEe/pmVS/F0jQU:xXdnfnwp3oOLuB/3/uQU
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5