General

  • Target

    a47594abad44472a21391f44d5715670_NeikiAnalytics

  • Size

    1.4MB

  • Sample

    240511-jwypfafd5z

  • MD5

    a47594abad44472a21391f44d5715670

  • SHA1

    bf0377a6319656c6fb27a830b75813b84db2a6a0

  • SHA256

    f0d01e889301db36770e2946b05104a72d0fa578a979da8ad70d390c9427c4bb

  • SHA512

    651c362b04973a875af1eb3f9a3669c6ff81797cb6c346fb2f3e4c0aab929dba3b5ceda2a21f7a385a8a06a583e13d83374b001af96adb7dea8c710877652f4e

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkiptb8q33F1QeQthKJAc+StNfNuUv6asN:Lz071uv4BPMkivwSbaMr6

Malware Config

Targets

    • Target

      a47594abad44472a21391f44d5715670_NeikiAnalytics

    • Size

      1.4MB

    • MD5

      a47594abad44472a21391f44d5715670

    • SHA1

      bf0377a6319656c6fb27a830b75813b84db2a6a0

    • SHA256

      f0d01e889301db36770e2946b05104a72d0fa578a979da8ad70d390c9427c4bb

    • SHA512

      651c362b04973a875af1eb3f9a3669c6ff81797cb6c346fb2f3e4c0aab929dba3b5ceda2a21f7a385a8a06a583e13d83374b001af96adb7dea8c710877652f4e

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkiptb8q33F1QeQthKJAc+StNfNuUv6asN:Lz071uv4BPMkivwSbaMr6

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks