General
-
Target
93f54c0215ce50417a55c27a4d0e77c0_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240525-qnk7psed62
-
MD5
93f54c0215ce50417a55c27a4d0e77c0
-
SHA1
852ded0580e00f67d148549a7053d2e87e6955bd
-
SHA256
3f2fd414e0834600cc80e16d2f99891aff581403c87c1069ae0155851273b32b
-
SHA512
b33eec2f569a4cf3e3c4bce1237d90ec6bd4a6b2f0444047f5652b1570cbbeb3669f006ce068af0f4600411da11effa2616cc22636abf457048073f6ae73bbbb
-
SSDEEP
3072:Kxe4mHvpNrRKPcG4Nvbd5Y+mgVgbyUwqGQ:KnuhNFmXYYyes
Static task
static1
Behavioral task
behavioral1
Sample
93f54c0215ce50417a55c27a4d0e77c0_NeikiAnalytics.dll
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
93f54c0215ce50417a55c27a4d0e77c0_NeikiAnalytics.exe
-
Size
120KB
-
MD5
93f54c0215ce50417a55c27a4d0e77c0
-
SHA1
852ded0580e00f67d148549a7053d2e87e6955bd
-
SHA256
3f2fd414e0834600cc80e16d2f99891aff581403c87c1069ae0155851273b32b
-
SHA512
b33eec2f569a4cf3e3c4bce1237d90ec6bd4a6b2f0444047f5652b1570cbbeb3669f006ce068af0f4600411da11effa2616cc22636abf457048073f6ae73bbbb
-
SSDEEP
3072:Kxe4mHvpNrRKPcG4Nvbd5Y+mgVgbyUwqGQ:KnuhNFmXYYyes
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5