General

  • Target

    6bcd5c0dde09304db0d3e00f635aa100_NeikiAnalytics

  • Size

    1.6MB

  • Sample

    240515-dktcpaee73

  • MD5

    6bcd5c0dde09304db0d3e00f635aa100

  • SHA1

    b452651657e4b0e3bc151280286835538d828960

  • SHA256

    500885b22211f48e4252c62db0f0fbf14ea64359ba6bd7b2680ca9ac9205894b

  • SHA512

    6805404677a4284849f84be64e9ad54737ec34ce333ad0f07754b61abc6d964ce87a2b50560ac400208acafc467ef8e2cbbf2c5d375ac38f57729aa17cbedc35

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkFfkeMlN675EgEPgspmBeQxWCLUrUj6:Lz071uv4BPMkFfdg6NsIRsUe

Malware Config

Targets

    • Target

      6bcd5c0dde09304db0d3e00f635aa100_NeikiAnalytics

    • Size

      1.6MB

    • MD5

      6bcd5c0dde09304db0d3e00f635aa100

    • SHA1

      b452651657e4b0e3bc151280286835538d828960

    • SHA256

      500885b22211f48e4252c62db0f0fbf14ea64359ba6bd7b2680ca9ac9205894b

    • SHA512

      6805404677a4284849f84be64e9ad54737ec34ce333ad0f07754b61abc6d964ce87a2b50560ac400208acafc467ef8e2cbbf2c5d375ac38f57729aa17cbedc35

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkFfkeMlN675EgEPgspmBeQxWCLUrUj6:Lz071uv4BPMkFfdg6NsIRsUe

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks