General
-
Target
1efd7b25e801a12343bc81fcbfb41ee0_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240524-te3xyabc5y
-
MD5
1efd7b25e801a12343bc81fcbfb41ee0
-
SHA1
1933c6ed55603d93602fee1fbd3c0037009d5f6f
-
SHA256
78dd86e63297d82bcf0164c115c95d6bff5d480832d04e5aff76d6940cce9657
-
SHA512
510a42dfd79a5cc10be1a2efefb1603bc3e99059924a2b6fa7af2196d809ebc718a15566b899d13ee5547f69663b133510faa81fccae3cdfbeddcea6e56a9ded
-
SSDEEP
3072:oQPI+26eTmbPLCTnZ5g5Y52aATDJf+KYY:HIr6eTmbP/Y5/AvJm
Static task
static1
Behavioral task
behavioral1
Sample
1efd7b25e801a12343bc81fcbfb41ee0_NeikiAnalytics.dll
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1efd7b25e801a12343bc81fcbfb41ee0_NeikiAnalytics.exe
-
Size
120KB
-
MD5
1efd7b25e801a12343bc81fcbfb41ee0
-
SHA1
1933c6ed55603d93602fee1fbd3c0037009d5f6f
-
SHA256
78dd86e63297d82bcf0164c115c95d6bff5d480832d04e5aff76d6940cce9657
-
SHA512
510a42dfd79a5cc10be1a2efefb1603bc3e99059924a2b6fa7af2196d809ebc718a15566b899d13ee5547f69663b133510faa81fccae3cdfbeddcea6e56a9ded
-
SSDEEP
3072:oQPI+26eTmbPLCTnZ5g5Y52aATDJf+KYY:HIr6eTmbP/Y5/AvJm
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5