General

  • Target

    ba7a2a72c61c660c556c0bc9076f77b0_NeikiAnalytics.exe

  • Size

    2.6MB

  • Sample

    240518-krabqacd77

  • MD5

    ba7a2a72c61c660c556c0bc9076f77b0

  • SHA1

    b5ecff7d1728bf3798d2d51554bc903fc6684b46

  • SHA256

    5401b5a7b7e4f05e38c98b6645143467903fac7cb04ba1364ead2e92d4df4dd0

  • SHA512

    0af0e906d6d20b72ea990cd7bfc6f1b56e37aa41d6b791b5794d4dcfd51b61fda236fa2f0866c85097d40745f6dec5182c8555cbbd1af5f96666284e3bfbbdab

  • SSDEEP

    49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/R2J:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RL

Malware Config

Targets

    • Target

      ba7a2a72c61c660c556c0bc9076f77b0_NeikiAnalytics.exe

    • Size

      2.6MB

    • MD5

      ba7a2a72c61c660c556c0bc9076f77b0

    • SHA1

      b5ecff7d1728bf3798d2d51554bc903fc6684b46

    • SHA256

      5401b5a7b7e4f05e38c98b6645143467903fac7cb04ba1364ead2e92d4df4dd0

    • SHA512

      0af0e906d6d20b72ea990cd7bfc6f1b56e37aa41d6b791b5794d4dcfd51b61fda236fa2f0866c85097d40745f6dec5182c8555cbbd1af5f96666284e3bfbbdab

    • SSDEEP

      49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/R2J:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RL

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks