General

  • Target

    4a73255db9f4075e74ade2132bd0ab60_NeikiAnalytics.exe

  • Size

    1.7MB

  • Sample

    240522-18bh4sah8x

  • MD5

    4a73255db9f4075e74ade2132bd0ab60

  • SHA1

    a8eea5f4dab42c777b3001a3bf77558b5997ee29

  • SHA256

    69e64c9d458587ef91623dc41514cd47dad20b9353b7b988df40219907276542

  • SHA512

    3532af3d95b7ce12474d21ca9aba56d9dd60fe061731acb7ce96db81a7593ff1f3b295ecabdc79dde30b00b5d3dfcf6cf80f6bf9f46e1ad297ef8940211145af

  • SSDEEP

    49152:Lz071uv4BPMkHC0IlnASEx/mi1DLIBn+2:NABs

Malware Config

Targets

    • Target

      4a73255db9f4075e74ade2132bd0ab60_NeikiAnalytics.exe

    • Size

      1.7MB

    • MD5

      4a73255db9f4075e74ade2132bd0ab60

    • SHA1

      a8eea5f4dab42c777b3001a3bf77558b5997ee29

    • SHA256

      69e64c9d458587ef91623dc41514cd47dad20b9353b7b988df40219907276542

    • SHA512

      3532af3d95b7ce12474d21ca9aba56d9dd60fe061731acb7ce96db81a7593ff1f3b295ecabdc79dde30b00b5d3dfcf6cf80f6bf9f46e1ad297ef8940211145af

    • SSDEEP

      49152:Lz071uv4BPMkHC0IlnASEx/mi1DLIBn+2:NABs

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks