General

  • Target

    d7e14ddccc829d6eaa5ed1ab6da37dd0_NeikiAnalytics.exe

  • Size

    120KB

  • Sample

    240526-xnsecagd7z

  • MD5

    d7e14ddccc829d6eaa5ed1ab6da37dd0

  • SHA1

    b85418e63edca7b82761cce6a7f4f62f6602f446

  • SHA256

    f0991325f2cf89cd75af99bd8ccccbc59ed2c799cbbe4971626c8a97cc706a75

  • SHA512

    6488a043b7817d72a08b7cbc8c08b30e9ebb5f96d4ba17885c880315044c3a712e46805de5515388182d52a1544e4550dffba627b81bafd548990683711391d5

  • SSDEEP

    1536:sBUz5U3qTiwyRyHA+6RjFBUCkhJtBf8kA47EYdY9qZMOK4MsY9:sBUdU4gp+6RjFGzJzfW47ElqZMF

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d7e14ddccc829d6eaa5ed1ab6da37dd0_NeikiAnalytics.exe

    • Size

      120KB

    • MD5

      d7e14ddccc829d6eaa5ed1ab6da37dd0

    • SHA1

      b85418e63edca7b82761cce6a7f4f62f6602f446

    • SHA256

      f0991325f2cf89cd75af99bd8ccccbc59ed2c799cbbe4971626c8a97cc706a75

    • SHA512

      6488a043b7817d72a08b7cbc8c08b30e9ebb5f96d4ba17885c880315044c3a712e46805de5515388182d52a1544e4550dffba627b81bafd548990683711391d5

    • SSDEEP

      1536:sBUz5U3qTiwyRyHA+6RjFBUCkhJtBf8kA47EYdY9qZMOK4MsY9:sBUdU4gp+6RjFGzJzfW47ElqZMF

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks