General

  • Target

    013fa06d9f9a9034dd6fdacf49802060_NeikiAnalytics.exe

  • Size

    292KB

  • Sample

    240527-p399pseb86

  • MD5

    013fa06d9f9a9034dd6fdacf49802060

  • SHA1

    c581bd0c0d661a2bf468598b31363dadd93066a3

  • SHA256

    e9f2e9ba0c5c8958e550481e1f2f850204d7882f04bd7414c254775c26271877

  • SHA512

    ae2fffc218c202052aff5bc7643fd92bd6dfac14c71169d05eefa82121d262ef854bf5aab5d7b87d21c58371f13bb0ac248ade75a67baada6767c08628c63ae1

  • SSDEEP

    6144:FvEI2U+T6i5LirrllHy4HUcMQY6s5oG7vdzYbXe:lEIN+T5xYrllrU7QY6a9zYq

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      013fa06d9f9a9034dd6fdacf49802060_NeikiAnalytics.exe

    • Size

      292KB

    • MD5

      013fa06d9f9a9034dd6fdacf49802060

    • SHA1

      c581bd0c0d661a2bf468598b31363dadd93066a3

    • SHA256

      e9f2e9ba0c5c8958e550481e1f2f850204d7882f04bd7414c254775c26271877

    • SHA512

      ae2fffc218c202052aff5bc7643fd92bd6dfac14c71169d05eefa82121d262ef854bf5aab5d7b87d21c58371f13bb0ac248ade75a67baada6767c08628c63ae1

    • SSDEEP

      6144:FvEI2U+T6i5LirrllHy4HUcMQY6s5oG7vdzYbXe:lEIN+T5xYrllrU7QY6a9zYq

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies visiblity of hidden/system files in Explorer

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks