General
-
Target
1be35250a7b1f958287c676b14a3c790_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240527-dpp6tsfb74
-
MD5
1be35250a7b1f958287c676b14a3c790
-
SHA1
60d5a448f956b0921fac6608a63c61c4e4e573e8
-
SHA256
6c32a490707eb432fdb33f4e6f4fde341d687743ae7e7bfa130f47b4c0058fbb
-
SHA512
727b984f4180bd01523358a9a66a22ca499533faddf6193660f698404b14ea876f805c0c829da6fda70e98526038c947f54b1358ad94def1af2757e063a7bb39
-
SSDEEP
3072:+ZQ1Jm1Iac4vEY4lsxas3B2q+xR/xE9V:B1Jmyac4vEY4lsss3Iq+xR/
Static task
static1
Behavioral task
behavioral1
Sample
1be35250a7b1f958287c676b14a3c790_NeikiAnalytics.dll
Resource
win7-20231129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1be35250a7b1f958287c676b14a3c790_NeikiAnalytics.exe
-
Size
120KB
-
MD5
1be35250a7b1f958287c676b14a3c790
-
SHA1
60d5a448f956b0921fac6608a63c61c4e4e573e8
-
SHA256
6c32a490707eb432fdb33f4e6f4fde341d687743ae7e7bfa130f47b4c0058fbb
-
SHA512
727b984f4180bd01523358a9a66a22ca499533faddf6193660f698404b14ea876f805c0c829da6fda70e98526038c947f54b1358ad94def1af2757e063a7bb39
-
SSDEEP
3072:+ZQ1Jm1Iac4vEY4lsxas3B2q+xR/xE9V:B1Jmyac4vEY4lsss3Iq+xR/
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5