General

  • Target

    1044c2963130f141adf98998013c57c0_NeikiAnalytics

  • Size

    1.5MB

  • Sample

    240513-yz68baca9z

  • MD5

    1044c2963130f141adf98998013c57c0

  • SHA1

    dc1a995e1a32608e555bd15deade4b29d444af93

  • SHA256

    66e005794f5888f24b06714eca38523b8fd1bb589d2e321061d8204974b76cb5

  • SHA512

    0764801440cc656d73f7dbb504dc34c88dd3063f986e16799a7ed37aaec48e0cb7af8af2b798aaad7373edaf2fb05cda882fe7c1baeee288d4f6c6eb935e5954

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkFfkeMlN675EgEPgsZLHYm2WVDE:Lz071uv4BPMkFfdg6NsNtJVg

Malware Config

Targets

    • Target

      1044c2963130f141adf98998013c57c0_NeikiAnalytics

    • Size

      1.5MB

    • MD5

      1044c2963130f141adf98998013c57c0

    • SHA1

      dc1a995e1a32608e555bd15deade4b29d444af93

    • SHA256

      66e005794f5888f24b06714eca38523b8fd1bb589d2e321061d8204974b76cb5

    • SHA512

      0764801440cc656d73f7dbb504dc34c88dd3063f986e16799a7ed37aaec48e0cb7af8af2b798aaad7373edaf2fb05cda882fe7c1baeee288d4f6c6eb935e5954

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkFfkeMlN675EgEPgsZLHYm2WVDE:Lz071uv4BPMkFfdg6NsNtJVg

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks