General
-
Target
4df4c28a9b4657f929ef9bdc44a0d350_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240524-1nkw2scc6t
-
MD5
4df4c28a9b4657f929ef9bdc44a0d350
-
SHA1
7083dfc3e7bd4b297b902fc18c49ee29dd6e6166
-
SHA256
4f20e029e3a65aeb978f2b19a2fcea2391c86e5d60ff9c4f627b7474b60f3df0
-
SHA512
91ca16a2937568911bd2eacb0b4f5560d487f082fe848bd8c92a7799631f6d58bdf766b0fc236ca3b251d0c1b5bbd0eaadc5bc12e6215ef22e6948cd17267762
-
SSDEEP
3072:dlftng9eZYxY7ODEwj09oi1A2QWjwZOtTRpMKtVGoczaWN:X2TREciLQW0GsoczaWN
Static task
static1
Behavioral task
behavioral1
Sample
4df4c28a9b4657f929ef9bdc44a0d350_NeikiAnalytics.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4df4c28a9b4657f929ef9bdc44a0d350_NeikiAnalytics.exe
-
Size
120KB
-
MD5
4df4c28a9b4657f929ef9bdc44a0d350
-
SHA1
7083dfc3e7bd4b297b902fc18c49ee29dd6e6166
-
SHA256
4f20e029e3a65aeb978f2b19a2fcea2391c86e5d60ff9c4f627b7474b60f3df0
-
SHA512
91ca16a2937568911bd2eacb0b4f5560d487f082fe848bd8c92a7799631f6d58bdf766b0fc236ca3b251d0c1b5bbd0eaadc5bc12e6215ef22e6948cd17267762
-
SSDEEP
3072:dlftng9eZYxY7ODEwj09oi1A2QWjwZOtTRpMKtVGoczaWN:X2TREciLQW0GsoczaWN
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5