General

  • Target

    cf9ed1acaa41d7a4d4bd6d4f7d5e8aa0_NeikiAnalytics.exe

  • Size

    65KB

  • Sample

    240616-dgn9ka1bql

  • MD5

    cf9ed1acaa41d7a4d4bd6d4f7d5e8aa0

  • SHA1

    5e8e997bfb24f4c7351cccb89026159f4b37eca6

  • SHA256

    474ba56c1b002873d3a5598c2e1fc2db37fdd0e7ae230053b563f2c5891949a8

  • SHA512

    3ba41e9aa4bd85d756195b615a22da765834ce98cb0e00b7c226237fa805b7e8778ea553016f9e0aa38c42c275af708012c0c7f96b85f32ace377562b751fb96

  • SSDEEP

    1536:K1lX4TPN2fkVuWViTLOkSu+qM/IdWkTY6TCVbIV+LmohQ:wXEEig2vurM/Id06TCaeLQ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      cf9ed1acaa41d7a4d4bd6d4f7d5e8aa0_NeikiAnalytics.exe

    • Size

      65KB

    • MD5

      cf9ed1acaa41d7a4d4bd6d4f7d5e8aa0

    • SHA1

      5e8e997bfb24f4c7351cccb89026159f4b37eca6

    • SHA256

      474ba56c1b002873d3a5598c2e1fc2db37fdd0e7ae230053b563f2c5891949a8

    • SHA512

      3ba41e9aa4bd85d756195b615a22da765834ce98cb0e00b7c226237fa805b7e8778ea553016f9e0aa38c42c275af708012c0c7f96b85f32ace377562b751fb96

    • SSDEEP

      1536:K1lX4TPN2fkVuWViTLOkSu+qM/IdWkTY6TCVbIV+LmohQ:wXEEig2vurM/Id06TCaeLQ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks