General

  • Target

    d57a9c48e401053774b696e522013000_NeikiAnalytics.exe

  • Size

    65KB

  • Sample

    240525-t5nwpsag3s

  • MD5

    d57a9c48e401053774b696e522013000

  • SHA1

    3114d4461ca84f9b4734656b90615e95b0c6b1af

  • SHA256

    84f258036102b9779719533c81f978a592359b91665df3a74c890447f0b11237

  • SHA512

    eda3cfd3027965d1563aacac8f6cacfc8024597e81cbc012e5412db58067e580dd9817c1d2ba0a3f89d98c0500fcbde12f85f38a078ce824d82cea9444a295b2

  • SSDEEP

    1536:UjmYx+6bJYJOagVNio5yd7nPTFfSzkDBAV/fE0yt8:xYxGJOa8y9nPTLmNByS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d57a9c48e401053774b696e522013000_NeikiAnalytics.exe

    • Size

      65KB

    • MD5

      d57a9c48e401053774b696e522013000

    • SHA1

      3114d4461ca84f9b4734656b90615e95b0c6b1af

    • SHA256

      84f258036102b9779719533c81f978a592359b91665df3a74c890447f0b11237

    • SHA512

      eda3cfd3027965d1563aacac8f6cacfc8024597e81cbc012e5412db58067e580dd9817c1d2ba0a3f89d98c0500fcbde12f85f38a078ce824d82cea9444a295b2

    • SSDEEP

      1536:UjmYx+6bJYJOagVNio5yd7nPTFfSzkDBAV/fE0yt8:xYxGJOa8y9nPTLmNByS

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks