General

  • Target

    bc2e4a97b3198ba269a537d866121df0_NeikiAnalytics

  • Size

    1.9MB

  • Sample

    240516-h87bnsad42

  • MD5

    bc2e4a97b3198ba269a537d866121df0

  • SHA1

    c9b5f59aaffe11bad1a20b659fcbceac62b66f9e

  • SHA256

    22433c259717f1acbf203d5da7e46f10aeb890e2e341322aa25ce4ed1bc5a057

  • SHA512

    2c9578f03e1269571382f5f71f01764a9427bc8a558688eacd534cec057b86370ebe9dd7477ef03152ac783641c8b685882925fa2036e1757bf9504fec1ed36e

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXY21UMeL:NABM

Malware Config

Targets

    • Target

      bc2e4a97b3198ba269a537d866121df0_NeikiAnalytics

    • Size

      1.9MB

    • MD5

      bc2e4a97b3198ba269a537d866121df0

    • SHA1

      c9b5f59aaffe11bad1a20b659fcbceac62b66f9e

    • SHA256

      22433c259717f1acbf203d5da7e46f10aeb890e2e341322aa25ce4ed1bc5a057

    • SHA512

      2c9578f03e1269571382f5f71f01764a9427bc8a558688eacd534cec057b86370ebe9dd7477ef03152ac783641c8b685882925fa2036e1757bf9504fec1ed36e

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXY21UMeL:NABM

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks