General
-
Target
5f767b67f19b79f399ab531e8fb96210_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240530-cbxhbabc86
-
MD5
5f767b67f19b79f399ab531e8fb96210
-
SHA1
ded936bb945b7ddde128f83adbddd1bb673ba84d
-
SHA256
a84d5d95994f257a131f1f52cdb5f0682c91822547d08d94e7dee6a2ca1f9ea4
-
SHA512
cfad38a884039560a3a964b9bd7917a1925c7c264d8eb0ca5cdf77a513da0af3c3360808dc8a6ce6f65a0ca644dbda8ae548742130b6c1f9356119a79e6ca72a
-
SSDEEP
3072:fjpY90bNXQD+XDIrQVQD/CPQ7yjfVgjU:fFRtQiTIrEQaQ7yjCjU
Static task
static1
Behavioral task
behavioral1
Sample
5f767b67f19b79f399ab531e8fb96210_NeikiAnalytics.dll
Resource
win7-20240419-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5f767b67f19b79f399ab531e8fb96210_NeikiAnalytics.exe
-
Size
120KB
-
MD5
5f767b67f19b79f399ab531e8fb96210
-
SHA1
ded936bb945b7ddde128f83adbddd1bb673ba84d
-
SHA256
a84d5d95994f257a131f1f52cdb5f0682c91822547d08d94e7dee6a2ca1f9ea4
-
SHA512
cfad38a884039560a3a964b9bd7917a1925c7c264d8eb0ca5cdf77a513da0af3c3360808dc8a6ce6f65a0ca644dbda8ae548742130b6c1f9356119a79e6ca72a
-
SSDEEP
3072:fjpY90bNXQD+XDIrQVQD/CPQ7yjfVgjU:fFRtQiTIrEQaQ7yjCjU
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5