General
-
Target
3de156423857ad9ee24a40c5e5f8270e0f4ede6c2a7beeabe7c0a54413f4f0bf_NeikiAnalytics.exe
-
Size
120KB
-
Sample
240626-c3gwyazcra
-
MD5
ff7a1ce7bae14f79fc451e73bfd4b6b0
-
SHA1
8eccfd9eee14cffeba926f72e6b689d8072fd480
-
SHA256
3de156423857ad9ee24a40c5e5f8270e0f4ede6c2a7beeabe7c0a54413f4f0bf
-
SHA512
41a552655aff58008535272939b5c496206ac94a8e6ac7fcaf5b0bd7b8d170fef3c915c48226996e1a5a6ccefdf85645ee8920f75ab22eb8b24bbc5f18637094
-
SSDEEP
1536:U45nxkCT1wyMgBAKFVz+sVAuGV4fo1BfqYFH12CxTC7q1NJZs9K5ttebZsT2XSMX:U45nyCT19Ac+smNzfqYN12GWid5KT4i
Static task
static1
Behavioral task
behavioral1
Sample
3de156423857ad9ee24a40c5e5f8270e0f4ede6c2a7beeabe7c0a54413f4f0bf_NeikiAnalytics.dll
Resource
win7-20240220-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
3de156423857ad9ee24a40c5e5f8270e0f4ede6c2a7beeabe7c0a54413f4f0bf_NeikiAnalytics.exe
-
Size
120KB
-
MD5
ff7a1ce7bae14f79fc451e73bfd4b6b0
-
SHA1
8eccfd9eee14cffeba926f72e6b689d8072fd480
-
SHA256
3de156423857ad9ee24a40c5e5f8270e0f4ede6c2a7beeabe7c0a54413f4f0bf
-
SHA512
41a552655aff58008535272939b5c496206ac94a8e6ac7fcaf5b0bd7b8d170fef3c915c48226996e1a5a6ccefdf85645ee8920f75ab22eb8b24bbc5f18637094
-
SSDEEP
1536:U45nxkCT1wyMgBAKFVz+sVAuGV4fo1BfqYFH12CxTC7q1NJZs9K5ttebZsT2XSMX:U45nyCT19Ac+smNzfqYN12GWid5KT4i
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5