General

  • Target

    33696aaf7febf5c07c77c8c00c7d0e30_NeikiAnalytics

  • Size

    2.7MB

  • Sample

    240510-v6xqnshc4z

  • MD5

    33696aaf7febf5c07c77c8c00c7d0e30

  • SHA1

    ed26a92cc79bb35d5534ea1d76f3141e36738929

  • SHA256

    30552a14f66634c0a044e2cb03a9a7584bcababfd6b7869cf2f7eced683de4e7

  • SHA512

    60bc5762a7728e0eb7b46e3df12fe7f7e3156080bf4c636a49094c04a58ad085386d0896d10f99aa8eeb39adde89e7121d5074aa535d0c3b7f945fe38b51bd55

  • SSDEEP

    49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/R/x:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2Rs

Malware Config

Targets

    • Target

      33696aaf7febf5c07c77c8c00c7d0e30_NeikiAnalytics

    • Size

      2.7MB

    • MD5

      33696aaf7febf5c07c77c8c00c7d0e30

    • SHA1

      ed26a92cc79bb35d5534ea1d76f3141e36738929

    • SHA256

      30552a14f66634c0a044e2cb03a9a7584bcababfd6b7869cf2f7eced683de4e7

    • SHA512

      60bc5762a7728e0eb7b46e3df12fe7f7e3156080bf4c636a49094c04a58ad085386d0896d10f99aa8eeb39adde89e7121d5074aa535d0c3b7f945fe38b51bd55

    • SSDEEP

      49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/R/x:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2Rs

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks