General
-
Target
24572a4adde7153f35f0c04c1fa325cae28628f091f8bc364fadbfa464e848eb_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240620-b1rspa1frc
-
MD5
2cb354460043689ae2947f9effd8ad50
-
SHA1
38534929f88452aef81cf6becda478efb13363da
-
SHA256
24572a4adde7153f35f0c04c1fa325cae28628f091f8bc364fadbfa464e848eb
-
SHA512
07d74a584011ada261d514192da8e7ad1e5403c59feedc80ff250b196d13ef303c29d80fa8910e8e9a9422b78104bf89e5a7c6fcd6f8f6fd23892a05d6619d35
-
SSDEEP
1536:+VT+6VVXaOFhnl8TpmZJy/VijCukrbTxPw+/s6Z1uFulVDWs:iS+qwgEJoVtukr/15hlVqs
Static task
static1
Behavioral task
behavioral1
Sample
24572a4adde7153f35f0c04c1fa325cae28628f091f8bc364fadbfa464e848eb_NeikiAnalytics.dll
Resource
win7-20240419-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
24572a4adde7153f35f0c04c1fa325cae28628f091f8bc364fadbfa464e848eb_NeikiAnalytics.exe
-
Size
120KB
-
MD5
2cb354460043689ae2947f9effd8ad50
-
SHA1
38534929f88452aef81cf6becda478efb13363da
-
SHA256
24572a4adde7153f35f0c04c1fa325cae28628f091f8bc364fadbfa464e848eb
-
SHA512
07d74a584011ada261d514192da8e7ad1e5403c59feedc80ff250b196d13ef303c29d80fa8910e8e9a9422b78104bf89e5a7c6fcd6f8f6fd23892a05d6619d35
-
SSDEEP
1536:+VT+6VVXaOFhnl8TpmZJy/VijCukrbTxPw+/s6Z1uFulVDWs:iS+qwgEJoVtukr/15hlVqs
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1