General

  • Target

    ab4589253f20994955371b058c375c60_NEIKI

  • Size

    1.9MB

  • Sample

    240509-an42taga3w

  • MD5

    ab4589253f20994955371b058c375c60

  • SHA1

    eb6f1e6fc70237855feeda72168afd47800a574b

  • SHA256

    d2b97712dbc60bb2fbcdbe99a44daca832b880c507ad7e42bb99f5f6137de3c4

  • SHA512

    a853437b387f9f5818f31bc7cf2a2cd50c870b32096f98109c3006590e28e9866a7ae64dea3eb772a6c84d5a8e325d8ca9d277458542ba0844e5adfa52bc55cd

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXHqZ:NABw

Malware Config

Targets

    • Target

      ab4589253f20994955371b058c375c60_NEIKI

    • Size

      1.9MB

    • MD5

      ab4589253f20994955371b058c375c60

    • SHA1

      eb6f1e6fc70237855feeda72168afd47800a574b

    • SHA256

      d2b97712dbc60bb2fbcdbe99a44daca832b880c507ad7e42bb99f5f6137de3c4

    • SHA512

      a853437b387f9f5818f31bc7cf2a2cd50c870b32096f98109c3006590e28e9866a7ae64dea3eb772a6c84d5a8e325d8ca9d277458542ba0844e5adfa52bc55cd

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXHqZ:NABw

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks