General

  • Target

    4173fc8120dfb406ce6b68269c87e990_NeikiAnalytics.exe

  • Size

    120KB

  • Sample

    240526-wz8d9sga97

  • MD5

    4173fc8120dfb406ce6b68269c87e990

  • SHA1

    85c386e72b4df50ce35307ad0f2f24d5de3943b7

  • SHA256

    27c3bb3e7d021ec0bb717d68bfec9bccc349775bda213a3dc61ba56dbc8b8442

  • SHA512

    29ef044e6ae1e52d2a60271442e2718a67c2098e053080ec237dceb6f15e9e38d98c0df0fde0c9f8af6a534cebc2f6400bab5bff675d7355716d26596f81df0c

  • SSDEEP

    1536:OCmby+vADN7IKOdKwv7UUdPfKa992RprYVKVlv2chbMkl/HXaQnHSWPEVZ:BmbvGFAhRdPfiRpMATOSM2vqQn9EVZ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4173fc8120dfb406ce6b68269c87e990_NeikiAnalytics.exe

    • Size

      120KB

    • MD5

      4173fc8120dfb406ce6b68269c87e990

    • SHA1

      85c386e72b4df50ce35307ad0f2f24d5de3943b7

    • SHA256

      27c3bb3e7d021ec0bb717d68bfec9bccc349775bda213a3dc61ba56dbc8b8442

    • SHA512

      29ef044e6ae1e52d2a60271442e2718a67c2098e053080ec237dceb6f15e9e38d98c0df0fde0c9f8af6a534cebc2f6400bab5bff675d7355716d26596f81df0c

    • SSDEEP

      1536:OCmby+vADN7IKOdKwv7UUdPfKa992RprYVKVlv2chbMkl/HXaQnHSWPEVZ:BmbvGFAhRdPfiRpMATOSM2vqQn9EVZ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks