General

  • Target

    14f2b5436227f4a9c3545a351dd854d0_NeikiAnalytics.exe

  • Size

    120KB

  • Sample

    240528-24hmashc57

  • MD5

    14f2b5436227f4a9c3545a351dd854d0

  • SHA1

    cb7fd21e459643542f5ced293a1d6d18daa91016

  • SHA256

    b902dfc9bff07c6bba5bc585a84ccec75d8782b06dfe72b31f2128bb0edaaca1

  • SHA512

    acf7681b65caa1a55b67d9bab59a6481865b68cdd808422ea52ad5b9e2c1d4393b29afb88b60b8399521a884a9421fe53689f16d04acf31eb8519f32f64d6573

  • SSDEEP

    1536:hoX5mAN5BzNurgXTNTjKjRRzW8LH0JlOH/T3NjaDF0zJVpxY5V7a+K:hopmAu8RnKjnzhlfUp0NO5h+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      14f2b5436227f4a9c3545a351dd854d0_NeikiAnalytics.exe

    • Size

      120KB

    • MD5

      14f2b5436227f4a9c3545a351dd854d0

    • SHA1

      cb7fd21e459643542f5ced293a1d6d18daa91016

    • SHA256

      b902dfc9bff07c6bba5bc585a84ccec75d8782b06dfe72b31f2128bb0edaaca1

    • SHA512

      acf7681b65caa1a55b67d9bab59a6481865b68cdd808422ea52ad5b9e2c1d4393b29afb88b60b8399521a884a9421fe53689f16d04acf31eb8519f32f64d6573

    • SSDEEP

      1536:hoX5mAN5BzNurgXTNTjKjRRzW8LH0JlOH/T3NjaDF0zJVpxY5V7a+K:hopmAu8RnKjnzhlfUp0NO5h+

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks