General
-
Target
27734b0adb6c4139d59fb6dfbbb948f0_NeikiAnalytics.exe
-
Size
65KB
-
Sample
240524-ssw6waag68
-
MD5
27734b0adb6c4139d59fb6dfbbb948f0
-
SHA1
424d634c331bc3d7fa74e1730a3b930d87dd35a9
-
SHA256
8a2430c24a3ff99eef5e25ea3910c5714a9fde80e2a27b467865119e3138cc97
-
SHA512
240a1a0f4ea513501e063a7534c071402e13dd3fa62a51f0c45502beb27ee86dc6b834c53e4fffa08b30950c7e36b3fed550740fb28376a1e1572b4520b17a46
-
SSDEEP
1536:ns5s5O6G7SMMasorRXS5x4LsBxHI50aRAbWGTifCUhtG78:4s5iv/1VExDI50aRAbWGTkCUu8
Static task
static1
Behavioral task
behavioral1
Sample
27734b0adb6c4139d59fb6dfbbb948f0_NeikiAnalytics.exe
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
27734b0adb6c4139d59fb6dfbbb948f0_NeikiAnalytics.exe
-
Size
65KB
-
MD5
27734b0adb6c4139d59fb6dfbbb948f0
-
SHA1
424d634c331bc3d7fa74e1730a3b930d87dd35a9
-
SHA256
8a2430c24a3ff99eef5e25ea3910c5714a9fde80e2a27b467865119e3138cc97
-
SHA512
240a1a0f4ea513501e063a7534c071402e13dd3fa62a51f0c45502beb27ee86dc6b834c53e4fffa08b30950c7e36b3fed550740fb28376a1e1572b4520b17a46
-
SSDEEP
1536:ns5s5O6G7SMMasorRXS5x4LsBxHI50aRAbWGTifCUhtG78:4s5iv/1VExDI50aRAbWGTkCUu8
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5