General

  • Target

    80e37fa8856fdc48ac87252b20b34760_NeikiAnalytics.exe

  • Size

    65KB

  • Sample

    240531-1lyecsed9s

  • MD5

    80e37fa8856fdc48ac87252b20b34760

  • SHA1

    5d5e3fe3ad8e57bbc97f27595ab4c400303581cb

  • SHA256

    13a068fbf594f9088431403864c76475e95584a22fd05221e5c9b87d569e2a77

  • SHA512

    395a39a43635909de9b72f627fcca54e04ea5feb138e1c0098a8b4ae8d766d6396061121bd158ebed1dc8e80ef5086145c5bd6f74d360ccf10f59cdcf9aa1532

  • SSDEEP

    1536:rpXGsd/5QQwjmCf7PhP2v3CCfie2SmHxo1DFJ7WzxgQXP:rFhdyDNPZe2Jx0DFJ7GgWP

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      80e37fa8856fdc48ac87252b20b34760_NeikiAnalytics.exe

    • Size

      65KB

    • MD5

      80e37fa8856fdc48ac87252b20b34760

    • SHA1

      5d5e3fe3ad8e57bbc97f27595ab4c400303581cb

    • SHA256

      13a068fbf594f9088431403864c76475e95584a22fd05221e5c9b87d569e2a77

    • SHA512

      395a39a43635909de9b72f627fcca54e04ea5feb138e1c0098a8b4ae8d766d6396061121bd158ebed1dc8e80ef5086145c5bd6f74d360ccf10f59cdcf9aa1532

    • SSDEEP

      1536:rpXGsd/5QQwjmCf7PhP2v3CCfie2SmHxo1DFJ7WzxgQXP:rFhdyDNPZe2Jx0DFJ7GgWP

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks