General
-
Target
077d940bf4239b2ee1b44d00f3d86710_NeikiAnalytics.exe
-
Size
65KB
-
Sample
240527-wlej2acd8v
-
MD5
077d940bf4239b2ee1b44d00f3d86710
-
SHA1
43c5a0b20b62ee4d86c37748f54daf26e892a8f1
-
SHA256
cb3bad1e915ce697ae7c0c8aec51db98bb6b3ead63fd7404c9d1796b7915591c
-
SHA512
79a56412ca5176c40916d0d2be6bd10b9b11b75c2e6d3983c8682db398524a4b637bc260a0c1dd85951a06de4bf917efa761dbe3f8f5ed59fd84ed30163f40bd
-
SSDEEP
1536:f8g01HMcLlA+3xfqB540KVKGcmhibij1feEHBkm2LKRlB:Ug0g+3s4RWij1fe2V2L+
Static task
static1
Behavioral task
behavioral1
Sample
077d940bf4239b2ee1b44d00f3d86710_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
077d940bf4239b2ee1b44d00f3d86710_NeikiAnalytics.exe
-
Size
65KB
-
MD5
077d940bf4239b2ee1b44d00f3d86710
-
SHA1
43c5a0b20b62ee4d86c37748f54daf26e892a8f1
-
SHA256
cb3bad1e915ce697ae7c0c8aec51db98bb6b3ead63fd7404c9d1796b7915591c
-
SHA512
79a56412ca5176c40916d0d2be6bd10b9b11b75c2e6d3983c8682db398524a4b637bc260a0c1dd85951a06de4bf917efa761dbe3f8f5ed59fd84ed30163f40bd
-
SSDEEP
1536:f8g01HMcLlA+3xfqB540KVKGcmhibij1feEHBkm2LKRlB:Ug0g+3s4RWij1fe2V2L+
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5