General
-
Target
13899f54de03d8edf331803be0040660_NeikiAnalytics.exe
-
Size
65KB
-
Sample
240528-2w14nsfg9s
-
MD5
13899f54de03d8edf331803be0040660
-
SHA1
6dea7c948276e7d216f32fd36d19b29b4e7c4191
-
SHA256
5a06bdfb7f43889e5b48464f46b0d15e540f9c4583abc780e0f26b6a30b460c9
-
SHA512
0509bd83a65e8ac3f96f8b372a1007974d62ea2416d43e09834655b16868a657fb2801a27ef843308dbcf25e4521af2920380b8c573a33e018d074e0752249ad
-
SSDEEP
1536:wL71Dg9b53itfr6eU1PfmEf0Q49mCzlOxquFd0dnY:wv1Dg91kfr9UIfJrgd0dnY
Static task
static1
Behavioral task
behavioral1
Sample
13899f54de03d8edf331803be0040660_NeikiAnalytics.exe
Resource
win7-20240419-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
13899f54de03d8edf331803be0040660_NeikiAnalytics.exe
-
Size
65KB
-
MD5
13899f54de03d8edf331803be0040660
-
SHA1
6dea7c948276e7d216f32fd36d19b29b4e7c4191
-
SHA256
5a06bdfb7f43889e5b48464f46b0d15e540f9c4583abc780e0f26b6a30b460c9
-
SHA512
0509bd83a65e8ac3f96f8b372a1007974d62ea2416d43e09834655b16868a657fb2801a27ef843308dbcf25e4521af2920380b8c573a33e018d074e0752249ad
-
SSDEEP
1536:wL71Dg9b53itfr6eU1PfmEf0Q49mCzlOxquFd0dnY:wv1Dg91kfr9UIfJrgd0dnY
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5