General

  • Target

    3fcf1d4ba927064943111dcf36567380_NeikiAnalytics.exe

  • Size

    120KB

  • Sample

    240526-avvfysgg98

  • MD5

    3fcf1d4ba927064943111dcf36567380

  • SHA1

    c16f980160210b67f75546f73e751cc48e0741d5

  • SHA256

    6140222e83e887a49903b742547ca3a4bc24ea210e6f5b39826daf447361571a

  • SHA512

    14028a66d40eea662e8e425f2988237216d507d9c6058e9ef400bd7f5e74ea3535f4d81c3c58edf796750c88a2d687f2823b1eac5494844f31045a763616e417

  • SSDEEP

    3072:d+tXEIW7DLZ1zoJYXJATMqITseN6z86I:oXE17DN6JuzBN6Y

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      3fcf1d4ba927064943111dcf36567380_NeikiAnalytics.exe

    • Size

      120KB

    • MD5

      3fcf1d4ba927064943111dcf36567380

    • SHA1

      c16f980160210b67f75546f73e751cc48e0741d5

    • SHA256

      6140222e83e887a49903b742547ca3a4bc24ea210e6f5b39826daf447361571a

    • SHA512

      14028a66d40eea662e8e425f2988237216d507d9c6058e9ef400bd7f5e74ea3535f4d81c3c58edf796750c88a2d687f2823b1eac5494844f31045a763616e417

    • SSDEEP

      3072:d+tXEIW7DLZ1zoJYXJATMqITseN6z86I:oXE17DN6JuzBN6Y

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks