General

  • Target

    6fa01a61776299b9e9f31f3b306f7f20_NeikiAnalytics.exe

  • Size

    120KB

  • Sample

    240531-azwvkshd33

  • MD5

    6fa01a61776299b9e9f31f3b306f7f20

  • SHA1

    166df1523d29ac1de637025b3c3952173a0a49c9

  • SHA256

    b271bb282aeb600619f56c416fd66fe9097046934d7a56f3908c7a7076fff96b

  • SHA512

    e9ea8336843d230726e44c06254a6608d8b1c339e610fab619d1a05823b7254c6bd50795f1105e46976846a19b85d4d9fce60697a2570a50d611f55b183ef1d3

  • SSDEEP

    1536:Yy/tUQ1ZlZ8xDKF/9Fqbh415ekGF+vv9cxh+ZFIdWRXehgAos+WReB69+3Fz:vX8xDqvgGLf6xhSVeS9to9+3

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      6fa01a61776299b9e9f31f3b306f7f20_NeikiAnalytics.exe

    • Size

      120KB

    • MD5

      6fa01a61776299b9e9f31f3b306f7f20

    • SHA1

      166df1523d29ac1de637025b3c3952173a0a49c9

    • SHA256

      b271bb282aeb600619f56c416fd66fe9097046934d7a56f3908c7a7076fff96b

    • SHA512

      e9ea8336843d230726e44c06254a6608d8b1c339e610fab619d1a05823b7254c6bd50795f1105e46976846a19b85d4d9fce60697a2570a50d611f55b183ef1d3

    • SSDEEP

      1536:Yy/tUQ1ZlZ8xDKF/9Fqbh415ekGF+vv9cxh+ZFIdWRXehgAos+WReB69+3Fz:vX8xDqvgGLf6xhSVeS9to9+3

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks