General

  • Target

    92dd50b095a2493a8707b78f327723c0_NeikiAnalytics

  • Size

    5.2MB

  • Sample

    240514-g5rldaea38

  • MD5

    92dd50b095a2493a8707b78f327723c0

  • SHA1

    50c2b499799e6800211f64721fc2cf29367490a9

  • SHA256

    b941e174a25c144b0b505d17bccfb2736a48dcacd3235cd45c46f7de2ab2d5d1

  • SHA512

    2cd69bf47cfbfb997f5d98f34c8981f88853fc3a6cafdbac95209b48cd20d77f2c89026fa77adb9a6c2e8e5b5acbe44f4efd218b02ad8cd71cba7ca457f0dffe

  • SSDEEP

    98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/Hn:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgj

Malware Config

Targets

    • Target

      92dd50b095a2493a8707b78f327723c0_NeikiAnalytics

    • Size

      5.2MB

    • MD5

      92dd50b095a2493a8707b78f327723c0

    • SHA1

      50c2b499799e6800211f64721fc2cf29367490a9

    • SHA256

      b941e174a25c144b0b505d17bccfb2736a48dcacd3235cd45c46f7de2ab2d5d1

    • SHA512

      2cd69bf47cfbfb997f5d98f34c8981f88853fc3a6cafdbac95209b48cd20d77f2c89026fa77adb9a6c2e8e5b5acbe44f4efd218b02ad8cd71cba7ca457f0dffe

    • SSDEEP

      98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/Hn:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgj

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks