General
-
Target
11958b5eacc81e0da552261a9ac8b510_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240608-xln9xaeg2z
-
MD5
11958b5eacc81e0da552261a9ac8b510
-
SHA1
f1d9534324ceeff18355ae00a388c05b5c5555a0
-
SHA256
831919277e1f5a125c4540fe2d8a8127c3b927e0eed6c15dbace363cac576e9b
-
SHA512
c98b900a650ca2cba0f8f995b3c6b32451a6f0661425b3496be2da9ae345ef6e6b22a830085e0bb5bf36b450b3d9a15e6011fa61af259a1f4fb7a0d4eb2b9db1
-
SSDEEP
3072:Ur/FAbTIuMs06Oh6YvbgCz6oqjyKkqUbo:UrtAHIBptfvsCzXqjyRbo
Static task
static1
Behavioral task
behavioral1
Sample
11958b5eacc81e0da552261a9ac8b510_NeikiAnalytics.dll
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
11958b5eacc81e0da552261a9ac8b510_NeikiAnalytics.exe
-
Size
120KB
-
MD5
11958b5eacc81e0da552261a9ac8b510
-
SHA1
f1d9534324ceeff18355ae00a388c05b5c5555a0
-
SHA256
831919277e1f5a125c4540fe2d8a8127c3b927e0eed6c15dbace363cac576e9b
-
SHA512
c98b900a650ca2cba0f8f995b3c6b32451a6f0661425b3496be2da9ae345ef6e6b22a830085e0bb5bf36b450b3d9a15e6011fa61af259a1f4fb7a0d4eb2b9db1
-
SSDEEP
3072:Ur/FAbTIuMs06Oh6YvbgCz6oqjyKkqUbo:UrtAHIBptfvsCzXqjyRbo
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3