General

  • Target

    4df4c28a9b4657f929ef9bdc44a0d350_NeikiAnalytics.exe

  • Size

    120KB

  • Sample

    240524-1nkw2scc6t

  • MD5

    4df4c28a9b4657f929ef9bdc44a0d350

  • SHA1

    7083dfc3e7bd4b297b902fc18c49ee29dd6e6166

  • SHA256

    4f20e029e3a65aeb978f2b19a2fcea2391c86e5d60ff9c4f627b7474b60f3df0

  • SHA512

    91ca16a2937568911bd2eacb0b4f5560d487f082fe848bd8c92a7799631f6d58bdf766b0fc236ca3b251d0c1b5bbd0eaadc5bc12e6215ef22e6948cd17267762

  • SSDEEP

    3072:dlftng9eZYxY7ODEwj09oi1A2QWjwZOtTRpMKtVGoczaWN:X2TREciLQW0GsoczaWN

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4df4c28a9b4657f929ef9bdc44a0d350_NeikiAnalytics.exe

    • Size

      120KB

    • MD5

      4df4c28a9b4657f929ef9bdc44a0d350

    • SHA1

      7083dfc3e7bd4b297b902fc18c49ee29dd6e6166

    • SHA256

      4f20e029e3a65aeb978f2b19a2fcea2391c86e5d60ff9c4f627b7474b60f3df0

    • SHA512

      91ca16a2937568911bd2eacb0b4f5560d487f082fe848bd8c92a7799631f6d58bdf766b0fc236ca3b251d0c1b5bbd0eaadc5bc12e6215ef22e6948cd17267762

    • SSDEEP

      3072:dlftng9eZYxY7ODEwj09oi1A2QWjwZOtTRpMKtVGoczaWN:X2TREciLQW0GsoczaWN

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks