General

  • Target

    560ae8f2a113c175d8bf896e3d8a78c0_NeikiAnalytics.exe

  • Size

    2.9MB

  • Sample

    240519-23k12agb3s

  • MD5

    560ae8f2a113c175d8bf896e3d8a78c0

  • SHA1

    4a5aa53c96d58d42e7e3914477a6b5dc777f001f

  • SHA256

    0ebd43078dc042876431735deaa757542b0dddb36dd2a1b6a54b67cf830120ab

  • SHA512

    b09b4153c65d4c20142fc61ad6e90222a0f55e80ba9f004954759401ac15cb0e23a22a16f54d2b83e57ddd0649cc5cc5665bc2705691bf63018e681552e47b1a

  • SSDEEP

    49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkFfdk2a2yKmf:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2R3

Malware Config

Targets

    • Target

      560ae8f2a113c175d8bf896e3d8a78c0_NeikiAnalytics.exe

    • Size

      2.9MB

    • MD5

      560ae8f2a113c175d8bf896e3d8a78c0

    • SHA1

      4a5aa53c96d58d42e7e3914477a6b5dc777f001f

    • SHA256

      0ebd43078dc042876431735deaa757542b0dddb36dd2a1b6a54b67cf830120ab

    • SHA512

      b09b4153c65d4c20142fc61ad6e90222a0f55e80ba9f004954759401ac15cb0e23a22a16f54d2b83e57ddd0649cc5cc5665bc2705691bf63018e681552e47b1a

    • SSDEEP

      49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkFfdk2a2yKmf:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2R3

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks