General

  • Target

    5e31aabaaf50d171148290ae4e6d078b7f03ac5dc0fc575d8e88d4b3f62fe67f_NeikiAnalytics.exe

  • Size

    2.1MB

  • Sample

    240629-ejmzyszgne

  • MD5

    50c4d84b11e5ba1fb4f31b1208fd63c0

  • SHA1

    f35149819eaae9b753046c13ba780ef54f77436d

  • SHA256

    5e31aabaaf50d171148290ae4e6d078b7f03ac5dc0fc575d8e88d4b3f62fe67f

  • SHA512

    fe09a891feeb89d50480f86aad287876d8dbbdb022bd02dffcc230a49cc8310aeea8fc341522eebb6ae3156654985c64913a238b86a6cf7329bfe7af6d5bdc11

  • SSDEEP

    6144:9bzJMBbbxaObYsth9va+Z4apldLBk/OLKRfK:b8bbxhkst2+VLDk/OLOf

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      5e31aabaaf50d171148290ae4e6d078b7f03ac5dc0fc575d8e88d4b3f62fe67f_NeikiAnalytics.exe

    • Size

      2.1MB

    • MD5

      50c4d84b11e5ba1fb4f31b1208fd63c0

    • SHA1

      f35149819eaae9b753046c13ba780ef54f77436d

    • SHA256

      5e31aabaaf50d171148290ae4e6d078b7f03ac5dc0fc575d8e88d4b3f62fe67f

    • SHA512

      fe09a891feeb89d50480f86aad287876d8dbbdb022bd02dffcc230a49cc8310aeea8fc341522eebb6ae3156654985c64913a238b86a6cf7329bfe7af6d5bdc11

    • SSDEEP

      6144:9bzJMBbbxaObYsth9va+Z4apldLBk/OLKRfK:b8bbxhkst2+VLDk/OLOf

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Modify Registry

5
T1112

Impair Defenses

4
T1562

Disable or Modify Tools

3
T1562.001

Disable or Modify System Firewall

1
T1562.004

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks