General

  • Target

    56a23b14e4d51c8e777d6f5604745b40_NeikiAnalytics.exe

  • Size

    120KB

  • Sample

    240523-lv39mscd64

  • MD5

    56a23b14e4d51c8e777d6f5604745b40

  • SHA1

    658b6a6c5c4189c60eb9904fdcc5616e1a19a44b

  • SHA256

    b02b64aa980c708ab9f36f3ab8f964fa86e443316d42e540a6cd12ee3ee8511e

  • SHA512

    2264c95c81274d3262eb2c2903f52a844c1104feb8cb433398639522f4b0f3b02beaea39c62fc1649cdd6d0c02ed27a05c6b4da636ca3caeb78d64baa9e191b3

  • SSDEEP

    3072:CN1t4KhTun5dn9pzZZ8k+hIOodvTrbrizg1kRa:e66Tun5dn9p8kLxhKg0a

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      56a23b14e4d51c8e777d6f5604745b40_NeikiAnalytics.exe

    • Size

      120KB

    • MD5

      56a23b14e4d51c8e777d6f5604745b40

    • SHA1

      658b6a6c5c4189c60eb9904fdcc5616e1a19a44b

    • SHA256

      b02b64aa980c708ab9f36f3ab8f964fa86e443316d42e540a6cd12ee3ee8511e

    • SHA512

      2264c95c81274d3262eb2c2903f52a844c1104feb8cb433398639522f4b0f3b02beaea39c62fc1649cdd6d0c02ed27a05c6b4da636ca3caeb78d64baa9e191b3

    • SSDEEP

      3072:CN1t4KhTun5dn9pzZZ8k+hIOodvTrbrizg1kRa:e66Tun5dn9p8kLxhKg0a

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks