General

  • Target

    a83a4712be710c2cce922a985b13aec0_NEIKI

  • Size

    3.2MB

  • Sample

    240509-agzthsfe7z

  • MD5

    a83a4712be710c2cce922a985b13aec0

  • SHA1

    c91e0c36134462849ad072103627565e96594060

  • SHA256

    a8f725d943e9f868a964ee4e67e4d1a5621b420f4faba151558695779e898776

  • SHA512

    2d08f5e1d18af0b992e16c56d9822e52d0e1949d75d95f73e4e10d0096f8bcdd9f1dc5f2bb58e248cd4afdd6c2a5fbbc41b26185b78b8dff48d852aa5f0b4972

  • SSDEEP

    98304:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWG:SbBeSFkK

Malware Config

Targets

    • Target

      a83a4712be710c2cce922a985b13aec0_NEIKI

    • Size

      3.2MB

    • MD5

      a83a4712be710c2cce922a985b13aec0

    • SHA1

      c91e0c36134462849ad072103627565e96594060

    • SHA256

      a8f725d943e9f868a964ee4e67e4d1a5621b420f4faba151558695779e898776

    • SHA512

      2d08f5e1d18af0b992e16c56d9822e52d0e1949d75d95f73e4e10d0096f8bcdd9f1dc5f2bb58e248cd4afdd6c2a5fbbc41b26185b78b8dff48d852aa5f0b4972

    • SSDEEP

      98304:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWG:SbBeSFkK

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks