General

  • Target

    338e1dfc2b07ff5f5c0c130cd2bfb670_NeikiAnalytics.exe

  • Size

    120KB

  • Sample

    240528-fl93yagd89

  • MD5

    338e1dfc2b07ff5f5c0c130cd2bfb670

  • SHA1

    4c3dfec49b6e626a88621d1d8a6e56fb7e1d7f76

  • SHA256

    b77c535a4a6c5b9799e0d9b0e123a990acd45be1d59ded0d62550aead8cdd853

  • SHA512

    3c2c8165398ef237edae7bc4990b06f78cad39092b8a720dde5d0a30f6c145fd531622390903764474826753e4c2153772c6f10c469b0df49a25c837130c937f

  • SSDEEP

    1536:0q/yJ2X7NBe7vj0gFDMYhxmPHur6QDUyS/Gis0mYJ8cU7g:0q/yj7ARYhY+705JA

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      338e1dfc2b07ff5f5c0c130cd2bfb670_NeikiAnalytics.exe

    • Size

      120KB

    • MD5

      338e1dfc2b07ff5f5c0c130cd2bfb670

    • SHA1

      4c3dfec49b6e626a88621d1d8a6e56fb7e1d7f76

    • SHA256

      b77c535a4a6c5b9799e0d9b0e123a990acd45be1d59ded0d62550aead8cdd853

    • SHA512

      3c2c8165398ef237edae7bc4990b06f78cad39092b8a720dde5d0a30f6c145fd531622390903764474826753e4c2153772c6f10c469b0df49a25c837130c937f

    • SSDEEP

      1536:0q/yJ2X7NBe7vj0gFDMYhxmPHur6QDUyS/Gis0mYJ8cU7g:0q/yj7ARYhY+705JA

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks