General
-
Target
5b489dd68c0fe003dbf340a428b12140_NeikiAnalytics.exe
-
Size
304KB
-
Sample
240524-vbhm9sch56
-
MD5
5b489dd68c0fe003dbf340a428b12140
-
SHA1
2012e55f144bce0dd890693a995d2671428213a0
-
SHA256
a3ea847e0b96858a2e18982391eb3db69f7ca6f71485b86b110907f0a5c771fe
-
SHA512
4710235d770a1e5a9eec9ce4d0d3270521d5234e2455bacd32594ff6bc58efdd178b7b2979efae108c310fed1ea6f045552344a7fb2bbb02558eec358a4056fa
-
SSDEEP
3072:+ogL5tpV+CSA1AAPoCpxW5ATBfUPhpS1svkTVC9FieYTTLprx/m3qT4S826guKq5:StpvoCpcPe1jQdifGBEBXRILSQgTy
Static task
static1
Behavioral task
behavioral1
Sample
5b489dd68c0fe003dbf340a428b12140_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5b489dd68c0fe003dbf340a428b12140_NeikiAnalytics.exe
-
Size
304KB
-
MD5
5b489dd68c0fe003dbf340a428b12140
-
SHA1
2012e55f144bce0dd890693a995d2671428213a0
-
SHA256
a3ea847e0b96858a2e18982391eb3db69f7ca6f71485b86b110907f0a5c771fe
-
SHA512
4710235d770a1e5a9eec9ce4d0d3270521d5234e2455bacd32594ff6bc58efdd178b7b2979efae108c310fed1ea6f045552344a7fb2bbb02558eec358a4056fa
-
SSDEEP
3072:+ogL5tpV+CSA1AAPoCpxW5ATBfUPhpS1svkTVC9FieYTTLprx/m3qT4S826guKq5:StpvoCpcPe1jQdifGBEBXRILSQgTy
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Drops file in Drivers directory
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
9