General

  • Target

    4854b0ef7c71aa0997d62e2dce5acaa0_NeikiAnalytics.exe

  • Size

    210KB

  • Sample

    240529-g36mhsea32

  • MD5

    4854b0ef7c71aa0997d62e2dce5acaa0

  • SHA1

    ce8a719747b2bff9c79320daf4a81ff3f6ac64b2

  • SHA256

    2f0b910744852f00358097ce43ab09936d6e7ee079fae714dd98f3441cd5343a

  • SHA512

    c0bd461fb1b2f00a2b4c4422fd0ea22a33e21bf7f8dd35cdf738ea79bfa864d3b55cf9a2f8218b5deb19a0772dc1c10a64caa858c7ebbe55575d6f5554916e86

  • SSDEEP

    6144:kDTOdgWtOhL6pJd3+bSCMTuddZdnj+rsuuhJSNi7nGpqwted:mTOdgWtCadBCYuP/j+IusJSNiSpqUy

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      4854b0ef7c71aa0997d62e2dce5acaa0_NeikiAnalytics.exe

    • Size

      210KB

    • MD5

      4854b0ef7c71aa0997d62e2dce5acaa0

    • SHA1

      ce8a719747b2bff9c79320daf4a81ff3f6ac64b2

    • SHA256

      2f0b910744852f00358097ce43ab09936d6e7ee079fae714dd98f3441cd5343a

    • SHA512

      c0bd461fb1b2f00a2b4c4422fd0ea22a33e21bf7f8dd35cdf738ea79bfa864d3b55cf9a2f8218b5deb19a0772dc1c10a64caa858c7ebbe55575d6f5554916e86

    • SSDEEP

      6144:kDTOdgWtOhL6pJd3+bSCMTuddZdnj+rsuuhJSNi7nGpqwted:mTOdgWtCadBCYuP/j+IusJSNiSpqUy

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks