General
-
Target
01f1d416e728ff3d7febfecf47b844ff0b8d8c952da6c75a4f1ee736e7f7f8cc_NeikiAnalytics.exe
-
Size
81KB
-
Sample
240619-w11qtawcjf
-
MD5
3e559eac30c4b4b9cca87860de672920
-
SHA1
44de75faf932ef35c2184adf25632349cfba4fc6
-
SHA256
01f1d416e728ff3d7febfecf47b844ff0b8d8c952da6c75a4f1ee736e7f7f8cc
-
SHA512
3a848019633acf02181a8041a49900b287292a908fb4245072b8d0c3e50552b90f6b3c031d7c8cf6f13d81968572081b9ee1dba3de370081bea1e027a2f6531f
-
SSDEEP
1536:OULZ5XXRbBRd5ZjY3lcN/1X69jYJGP8VhNv9BtNJoy2+WqETgOLfZhRzV5:nt5XhbPUKNVxrZt12XjZV5
Static task
static1
Behavioral task
behavioral1
Sample
01f1d416e728ff3d7febfecf47b844ff0b8d8c952da6c75a4f1ee736e7f7f8cc_NeikiAnalytics.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
01f1d416e728ff3d7febfecf47b844ff0b8d8c952da6c75a4f1ee736e7f7f8cc_NeikiAnalytics.exe
-
Size
81KB
-
MD5
3e559eac30c4b4b9cca87860de672920
-
SHA1
44de75faf932ef35c2184adf25632349cfba4fc6
-
SHA256
01f1d416e728ff3d7febfecf47b844ff0b8d8c952da6c75a4f1ee736e7f7f8cc
-
SHA512
3a848019633acf02181a8041a49900b287292a908fb4245072b8d0c3e50552b90f6b3c031d7c8cf6f13d81968572081b9ee1dba3de370081bea1e027a2f6531f
-
SSDEEP
1536:OULZ5XXRbBRd5ZjY3lcN/1X69jYJGP8VhNv9BtNJoy2+WqETgOLfZhRzV5:nt5XhbPUKNVxrZt12XjZV5
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1