General
-
Target
502245fea9ce9736de775c587cfc2eb0_NeikiAnalytics.exe
-
Size
292KB
-
Sample
240529-lyr1saag3t
-
MD5
502245fea9ce9736de775c587cfc2eb0
-
SHA1
bd5fceb952019c1ab15e90e2c0d6294eada8011f
-
SHA256
bac724d6a090749660d5ed5b5694f9d989ec1d32fb9988d1f0798b6b38b50afe
-
SHA512
0dd3afcb478f53ae24879418ab28b424e014b37ffc6f8e544fe62564189249e37f5514a98dff73c39f3100803a06a6cf54c3e8e36334990c9ac47ce7ec4f1245
-
SSDEEP
6144:0vEF2U+T6i5LirrllHy4HUcMQY6wdgykIduVr/GASXETt:mEFN+T5xYrllrU7QY6wLkIo6A9t
Static task
static1
Behavioral task
behavioral1
Sample
502245fea9ce9736de775c587cfc2eb0_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
502245fea9ce9736de775c587cfc2eb0_NeikiAnalytics.exe
-
Size
292KB
-
MD5
502245fea9ce9736de775c587cfc2eb0
-
SHA1
bd5fceb952019c1ab15e90e2c0d6294eada8011f
-
SHA256
bac724d6a090749660d5ed5b5694f9d989ec1d32fb9988d1f0798b6b38b50afe
-
SHA512
0dd3afcb478f53ae24879418ab28b424e014b37ffc6f8e544fe62564189249e37f5514a98dff73c39f3100803a06a6cf54c3e8e36334990c9ac47ce7ec4f1245
-
SSDEEP
6144:0vEF2U+T6i5LirrllHy4HUcMQY6wdgykIduVr/GASXETt:mEFN+T5xYrllrU7QY6wLkIo6A9t
-
Detects BazaLoader malware
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies visiblity of hidden/system files in Explorer
-
Modifies Installed Components in the registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
9