General

  • Target

    16e3d92f16e9ccc3752437a114d82ac0_NeikiAnalytics.exe

  • Size

    463KB

  • Sample

    240526-vplbbadf3w

  • MD5

    16e3d92f16e9ccc3752437a114d82ac0

  • SHA1

    a06991b8c646fd262b241f34f8613f478228fac6

  • SHA256

    ad7053f43a80b0565bf8939f6e65eb0387d5bca3a22ec2e217e0a027beeb8d54

  • SHA512

    b008d3d738ebb18cac46e524398b1fae3dd2ca1d8640748158d1b1b7ac44a500c5e3345c6b9cc8ae720326c67bf7e464a88a287c858f96b16a6824c8b37ad633

  • SSDEEP

    12288:5NUhiHOR4mucvSFSrux88ndNtJXzLFziVbs0:LUhiHOeB8rin3thLof

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      16e3d92f16e9ccc3752437a114d82ac0_NeikiAnalytics.exe

    • Size

      463KB

    • MD5

      16e3d92f16e9ccc3752437a114d82ac0

    • SHA1

      a06991b8c646fd262b241f34f8613f478228fac6

    • SHA256

      ad7053f43a80b0565bf8939f6e65eb0387d5bca3a22ec2e217e0a027beeb8d54

    • SHA512

      b008d3d738ebb18cac46e524398b1fae3dd2ca1d8640748158d1b1b7ac44a500c5e3345c6b9cc8ae720326c67bf7e464a88a287c858f96b16a6824c8b37ad633

    • SSDEEP

      12288:5NUhiHOR4mucvSFSrux88ndNtJXzLFziVbs0:LUhiHOeB8rin3thLof

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks