General

  • Target

    13899f54de03d8edf331803be0040660_NeikiAnalytics.exe

  • Size

    65KB

  • Sample

    240528-2w14nsfg9s

  • MD5

    13899f54de03d8edf331803be0040660

  • SHA1

    6dea7c948276e7d216f32fd36d19b29b4e7c4191

  • SHA256

    5a06bdfb7f43889e5b48464f46b0d15e540f9c4583abc780e0f26b6a30b460c9

  • SHA512

    0509bd83a65e8ac3f96f8b372a1007974d62ea2416d43e09834655b16868a657fb2801a27ef843308dbcf25e4521af2920380b8c573a33e018d074e0752249ad

  • SSDEEP

    1536:wL71Dg9b53itfr6eU1PfmEf0Q49mCzlOxquFd0dnY:wv1Dg91kfr9UIfJrgd0dnY

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      13899f54de03d8edf331803be0040660_NeikiAnalytics.exe

    • Size

      65KB

    • MD5

      13899f54de03d8edf331803be0040660

    • SHA1

      6dea7c948276e7d216f32fd36d19b29b4e7c4191

    • SHA256

      5a06bdfb7f43889e5b48464f46b0d15e540f9c4583abc780e0f26b6a30b460c9

    • SHA512

      0509bd83a65e8ac3f96f8b372a1007974d62ea2416d43e09834655b16868a657fb2801a27ef843308dbcf25e4521af2920380b8c573a33e018d074e0752249ad

    • SSDEEP

      1536:wL71Dg9b53itfr6eU1PfmEf0Q49mCzlOxquFd0dnY:wv1Dg91kfr9UIfJrgd0dnY

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks