General
-
Target
36caf71ae0233577a44af1f9d7bd2370_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240617-cxmj8szfjg
-
MD5
36caf71ae0233577a44af1f9d7bd2370
-
SHA1
1a6f7d80e13481180c8f4f506d66b5ae8ec90d3d
-
SHA256
529661c8cc256ead74a598e70a73fd28a7f4f1653e6d90854e235c1cde3b2aec
-
SHA512
33f1e1bdbc0a9dda52682b0035be6a73434b233e7ff7dae2d2c3f81ad521d41a4bf1456b1af4950441e3cb6ab5243cbceb402322010810cf68a55178c222fe01
-
SSDEEP
1536:zIU426bHiV1w3Xk0TvsDYLiPErzTNDev1iqbRM5L2+ZxaLeZ7oNjwNdEXADz:0ULh1a0saYRNDs1iqVM6+OLooBwNV
Static task
static1
Behavioral task
behavioral1
Sample
36caf71ae0233577a44af1f9d7bd2370_NeikiAnalytics.dll
Resource
win7-20240611-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
36caf71ae0233577a44af1f9d7bd2370_NeikiAnalytics.exe
-
Size
120KB
-
MD5
36caf71ae0233577a44af1f9d7bd2370
-
SHA1
1a6f7d80e13481180c8f4f506d66b5ae8ec90d3d
-
SHA256
529661c8cc256ead74a598e70a73fd28a7f4f1653e6d90854e235c1cde3b2aec
-
SHA512
33f1e1bdbc0a9dda52682b0035be6a73434b233e7ff7dae2d2c3f81ad521d41a4bf1456b1af4950441e3cb6ab5243cbceb402322010810cf68a55178c222fe01
-
SSDEEP
1536:zIU426bHiV1w3Xk0TvsDYLiPErzTNDev1iqbRM5L2+ZxaLeZ7oNjwNdEXADz:0ULh1a0saYRNDs1iqVM6+OLooBwNV
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3