General

  • Target

    09f24b58ef2a9b95e46f7d3d17726010_NeikiAnalytics

  • Size

    2.9MB

  • Sample

    240510-z9xmasae3v

  • MD5

    09f24b58ef2a9b95e46f7d3d17726010

  • SHA1

    50495e61677692605d1c0628588d3c5575c36b57

  • SHA256

    11bf0cddee1fbe25f26ffb0c9444c753a5fd19eae9d21a8c44e84a1e7b141b58

  • SHA512

    394fc9da16b3acf311221e2eedfc07244742081e7231a83dac927a366de67e1d8a3a02457514a2d57ea10cad376ea8f1e5f9174f30cdcd483bb1d009776d9d30

  • SSDEEP

    49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkFfdg6NsIRhA/df:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2Rf

Malware Config

Targets

    • Target

      09f24b58ef2a9b95e46f7d3d17726010_NeikiAnalytics

    • Size

      2.9MB

    • MD5

      09f24b58ef2a9b95e46f7d3d17726010

    • SHA1

      50495e61677692605d1c0628588d3c5575c36b57

    • SHA256

      11bf0cddee1fbe25f26ffb0c9444c753a5fd19eae9d21a8c44e84a1e7b141b58

    • SHA512

      394fc9da16b3acf311221e2eedfc07244742081e7231a83dac927a366de67e1d8a3a02457514a2d57ea10cad376ea8f1e5f9174f30cdcd483bb1d009776d9d30

    • SSDEEP

      49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkFfdg6NsIRhA/df:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2Rf

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks