General
-
Target
b87d46694be4a1ef04fcc16beec93ce0_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240619-ngf83ayhnh
-
MD5
b87d46694be4a1ef04fcc16beec93ce0
-
SHA1
da09072b98cd4720908f6915f35ce51bb0a293b3
-
SHA256
acc2a5c0f24837f8bf657b89e00f34e89860fc0f9a713a958a8a52336e2c5ff6
-
SHA512
5c280b788d7412f963b254112cd35c8d6384c4923400d5a0c64ac1dd4714356ad5b9795eace316c7b118b40a56474a85e63b5c1ec282d582c3453b60b4f6092b
-
SSDEEP
3072:r7OEAq86nAC3e6og92V62ABt93mkdOn/6d6eUSY:/OEAqiCuvgam3mkdhlU9
Static task
static1
Behavioral task
behavioral1
Sample
b87d46694be4a1ef04fcc16beec93ce0_NeikiAnalytics.dll
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b87d46694be4a1ef04fcc16beec93ce0_NeikiAnalytics.exe
-
Size
120KB
-
MD5
b87d46694be4a1ef04fcc16beec93ce0
-
SHA1
da09072b98cd4720908f6915f35ce51bb0a293b3
-
SHA256
acc2a5c0f24837f8bf657b89e00f34e89860fc0f9a713a958a8a52336e2c5ff6
-
SHA512
5c280b788d7412f963b254112cd35c8d6384c4923400d5a0c64ac1dd4714356ad5b9795eace316c7b118b40a56474a85e63b5c1ec282d582c3453b60b4f6092b
-
SSDEEP
3072:r7OEAq86nAC3e6og92V62ABt93mkdOn/6d6eUSY:/OEAqiCuvgam3mkdhlU9
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1