General

  • Target

    03fc9f23a0340f6c8b49aa87b9cfa6b0_NeikiAnalytics.exe

  • Size

    1.7MB

  • Sample

    240521-xxtnrsfe7x

  • MD5

    03fc9f23a0340f6c8b49aa87b9cfa6b0

  • SHA1

    3c11d43a441dfc18c122f3dd07e31560fc59d9ec

  • SHA256

    b86b986e1d7438e303609d2526cc39c1f36949e3afba80d5c9340ba4341fff22

  • SHA512

    b768f4d477d61f798197160779800332816716e61bc56ac174e292ee8f5e4879e04b1ca227b50391c0cae55cf7fdf49abf7403ea76be75e26bf65ae2ad49eecc

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Q1szp5NnNvZWNChZ7K6WefmedkVoMXfP:Lz071uv4BPMkyW10/w16BvZuaXa

Malware Config

Targets

    • Target

      03fc9f23a0340f6c8b49aa87b9cfa6b0_NeikiAnalytics.exe

    • Size

      1.7MB

    • MD5

      03fc9f23a0340f6c8b49aa87b9cfa6b0

    • SHA1

      3c11d43a441dfc18c122f3dd07e31560fc59d9ec

    • SHA256

      b86b986e1d7438e303609d2526cc39c1f36949e3afba80d5c9340ba4341fff22

    • SHA512

      b768f4d477d61f798197160779800332816716e61bc56ac174e292ee8f5e4879e04b1ca227b50391c0cae55cf7fdf49abf7403ea76be75e26bf65ae2ad49eecc

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Q1szp5NnNvZWNChZ7K6WefmedkVoMXfP:Lz071uv4BPMkyW10/w16BvZuaXa

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks