General
-
Target
bca6cf563f093794214072664a387890_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240531-xjwafaac76
-
MD5
bca6cf563f093794214072664a387890
-
SHA1
d4a430e2489620a47b5af88206db91c2addecc8d
-
SHA256
842e6d8d30ef9db4827529fc42bda2a1c36efd7e1316ce132ee5fc85a8a04dcc
-
SHA512
679c263888d089a16d8a934aa0788071d658cf0b9db600fc9491eaa2072d667a932207f7e09636d54aef4b735c54f72a2a85e052416df102d2b5516b9457cb2a
-
SSDEEP
3072:w5YfdVHWjpKA2ARJN2/OsZlIbyyB6VXDI:w5Yfdw8iR/Q0bxBf
Static task
static1
Behavioral task
behavioral1
Sample
bca6cf563f093794214072664a387890_NeikiAnalytics.dll
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
bca6cf563f093794214072664a387890_NeikiAnalytics.exe
-
Size
120KB
-
MD5
bca6cf563f093794214072664a387890
-
SHA1
d4a430e2489620a47b5af88206db91c2addecc8d
-
SHA256
842e6d8d30ef9db4827529fc42bda2a1c36efd7e1316ce132ee5fc85a8a04dcc
-
SHA512
679c263888d089a16d8a934aa0788071d658cf0b9db600fc9491eaa2072d667a932207f7e09636d54aef4b735c54f72a2a85e052416df102d2b5516b9457cb2a
-
SSDEEP
3072:w5YfdVHWjpKA2ARJN2/OsZlIbyyB6VXDI:w5Yfdw8iR/Q0bxBf
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5