General
-
Target
36b4e870e4c76051d0090bd8836a4340_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240617-cw9ndazere
-
MD5
36b4e870e4c76051d0090bd8836a4340
-
SHA1
7250509f9967b5dd84fc81c0234e9df3cc58143e
-
SHA256
e5435ea2ad2749b19e900b3511a29068e24e015628e294539782596770d18512
-
SHA512
62b1c07030696eec673049b9ea6a43daf12e2eb2ec22db6fecc609aa601d45904b7da4734fcbbb1181cdb5e3ce3a878bbe6b618a12111261f93c8f28a53d1163
-
SSDEEP
3072:g/t71q3tqB7k6CoxUaDEvy1omb4VpWEUAyR9:gNY3tA7LL5tzb4V2A29
Static task
static1
Behavioral task
behavioral1
Sample
36b4e870e4c76051d0090bd8836a4340_NeikiAnalytics.dll
Resource
win7-20240220-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
36b4e870e4c76051d0090bd8836a4340_NeikiAnalytics.exe
-
Size
120KB
-
MD5
36b4e870e4c76051d0090bd8836a4340
-
SHA1
7250509f9967b5dd84fc81c0234e9df3cc58143e
-
SHA256
e5435ea2ad2749b19e900b3511a29068e24e015628e294539782596770d18512
-
SHA512
62b1c07030696eec673049b9ea6a43daf12e2eb2ec22db6fecc609aa601d45904b7da4734fcbbb1181cdb5e3ce3a878bbe6b618a12111261f93c8f28a53d1163
-
SSDEEP
3072:g/t71q3tqB7k6CoxUaDEvy1omb4VpWEUAyR9:gNY3tA7LL5tzb4V2A29
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3