General
-
Target
39fd95fc77ee75dd9b8aa2307ff15690_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240617-dbmtjs1bqe
-
MD5
39fd95fc77ee75dd9b8aa2307ff15690
-
SHA1
5c8365ac2a7b82f97b89c7228b8d5dc489bfd731
-
SHA256
f1de03b355788ab926d998a161cf0bb5962677e3eeac33fbd329df1b67c1e399
-
SHA512
1d8c63686e455f47169dd962ad09a09a72691aa792048b0f5fcc2a4e1354c10621593f70c08c802bbf3e0919d95593a69f1806f4c7880b5e75d785b28d7fd085
-
SSDEEP
3072:5HPrWiWwg0GFGFmpdfW3cxPP1KGa/kJusyUq6XPAiv8J:5qiWmPFgUCPP1cA7Nq6/Aiv8J
Static task
static1
Behavioral task
behavioral1
Sample
39fd95fc77ee75dd9b8aa2307ff15690_NeikiAnalytics.dll
Resource
win7-20240611-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
39fd95fc77ee75dd9b8aa2307ff15690_NeikiAnalytics.exe
-
Size
120KB
-
MD5
39fd95fc77ee75dd9b8aa2307ff15690
-
SHA1
5c8365ac2a7b82f97b89c7228b8d5dc489bfd731
-
SHA256
f1de03b355788ab926d998a161cf0bb5962677e3eeac33fbd329df1b67c1e399
-
SHA512
1d8c63686e455f47169dd962ad09a09a72691aa792048b0f5fcc2a4e1354c10621593f70c08c802bbf3e0919d95593a69f1806f4c7880b5e75d785b28d7fd085
-
SSDEEP
3072:5HPrWiWwg0GFGFmpdfW3cxPP1KGa/kJusyUq6XPAiv8J:5qiWmPFgUCPP1cA7Nq6/Aiv8J
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3