General
-
Target
e019b869a1ac526dc6305eacaef4e430_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240616-h5ga3svapb
-
MD5
e019b869a1ac526dc6305eacaef4e430
-
SHA1
1d9c30d14b744c8646b944ad2d439f1f35e6fb5e
-
SHA256
319d36b75249c5ce55b6521beef91f1ada501734b52d2bdfcc18a0bc787b8ba3
-
SHA512
26cbc31e6a4ca314a5fdc14708531d99bec28395d451c0d57d242da7031c1c06d8142fa14bc4dadce2da64fc623890d0b16a396684650a4d14c15bfde85a1ded
-
SSDEEP
1536:sqALPI/JSM5Lwj+ZlxyxIQ3rIVOZDkBUrn3n2dRw7ydigTm1o5vsd8YOIx60EQ:sVPM0auilxyOQZ0E3n97vgTsoCF56p
Static task
static1
Behavioral task
behavioral1
Sample
e019b869a1ac526dc6305eacaef4e430_NeikiAnalytics.dll
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e019b869a1ac526dc6305eacaef4e430_NeikiAnalytics.exe
-
Size
120KB
-
MD5
e019b869a1ac526dc6305eacaef4e430
-
SHA1
1d9c30d14b744c8646b944ad2d439f1f35e6fb5e
-
SHA256
319d36b75249c5ce55b6521beef91f1ada501734b52d2bdfcc18a0bc787b8ba3
-
SHA512
26cbc31e6a4ca314a5fdc14708531d99bec28395d451c0d57d242da7031c1c06d8142fa14bc4dadce2da64fc623890d0b16a396684650a4d14c15bfde85a1ded
-
SSDEEP
1536:sqALPI/JSM5Lwj+ZlxyxIQ3rIVOZDkBUrn3n2dRw7ydigTm1o5vsd8YOIx60EQ:sVPM0auilxyOQZ0E3n97vgTsoCF56p
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3