General
-
Target
2d9978ffe574f05460f451d62dea69b0_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240525-2nx22sdb8w
-
MD5
2d9978ffe574f05460f451d62dea69b0
-
SHA1
953b026b41e2f3bd18052a68656c97bdda650735
-
SHA256
b618ec6ea403a08c8d1ce48e50954792795cf50a0a05fe849646b5445f245adb
-
SHA512
bc875f3f020cb34a2124a66f3e438f1823d14e9f17fc3f635ee9260e032edc7aa6c70f2ebf66eb3acd396b072ee371247a0e321914719ec72fee368dca1f16a4
-
SSDEEP
3072:xijY3UvC/H+F0Iinj/Ybex9VHeVrjTeh:VEvGH+Knsbwre9j
Static task
static1
Behavioral task
behavioral1
Sample
2d9978ffe574f05460f451d62dea69b0_NeikiAnalytics.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2d9978ffe574f05460f451d62dea69b0_NeikiAnalytics.exe
-
Size
120KB
-
MD5
2d9978ffe574f05460f451d62dea69b0
-
SHA1
953b026b41e2f3bd18052a68656c97bdda650735
-
SHA256
b618ec6ea403a08c8d1ce48e50954792795cf50a0a05fe849646b5445f245adb
-
SHA512
bc875f3f020cb34a2124a66f3e438f1823d14e9f17fc3f635ee9260e032edc7aa6c70f2ebf66eb3acd396b072ee371247a0e321914719ec72fee368dca1f16a4
-
SSDEEP
3072:xijY3UvC/H+F0Iinj/Ybex9VHeVrjTeh:VEvGH+Knsbwre9j
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5