General

  • Target

    0bfe69c41285be671b5a6667cec07740_NeikiAnalytics.exe

  • Size

    2.6MB

  • Sample

    240616-z927sayele

  • MD5

    0bfe69c41285be671b5a6667cec07740

  • SHA1

    7b71af2c9ec60aa4b8e152a3f18de7ae3117816c

  • SHA256

    0b4e431ce900e4b476f28a635beb8b0e91ac412405bae9a47fbb69c4713db7d8

  • SHA512

    a2f4dd0d30ea48a2871eebd23c6456a9b646e799a8b8480158f71f8bb3e7ece6002c89c7fd1f2f479dd331e69ac76794c3b39655654fd38cca6d3125048b1d90

  • SSDEEP

    49152:CR/KpmZubPf2S8W2ILeWl+C1p9jWy5Snd0eigX6j:k/jtYLP1Sy5E0B

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      0bfe69c41285be671b5a6667cec07740_NeikiAnalytics.exe

    • Size

      2.6MB

    • MD5

      0bfe69c41285be671b5a6667cec07740

    • SHA1

      7b71af2c9ec60aa4b8e152a3f18de7ae3117816c

    • SHA256

      0b4e431ce900e4b476f28a635beb8b0e91ac412405bae9a47fbb69c4713db7d8

    • SHA512

      a2f4dd0d30ea48a2871eebd23c6456a9b646e799a8b8480158f71f8bb3e7ece6002c89c7fd1f2f479dd331e69ac76794c3b39655654fd38cca6d3125048b1d90

    • SSDEEP

      49152:CR/KpmZubPf2S8W2ILeWl+C1p9jWy5Snd0eigX6j:k/jtYLP1Sy5E0B

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Modify Registry

5
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Discovery

System Information Discovery

1
T1082

Tasks