General

  • Target

    4bb0de84d1a866bc340b00c69a0b7fd0_NeikiAnalytics.exe

  • Size

    1.6MB

  • Sample

    240522-2cgwpabc93

  • MD5

    4bb0de84d1a866bc340b00c69a0b7fd0

  • SHA1

    32d296de985df4fcebcb765ea25a63084a2e2317

  • SHA256

    c322ac9dcb6385b208020f0887f32cea5a2cd514d7b6e1f3d3195f588778efbf

  • SHA512

    e6b68a0ba269e44c4337c86f671d606e67a8751b96ab969433e83ccea7077e9f1cb25a264eb8fa42f50237a99218241154c8db1ddc0d1fd10603f201bc80dd5d

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkUCCWvLEvjuJoz5XdUK6S1uBkr5Gqlfz+y7p9Dbkj:Lz071uv4BPMkHC0I6Gz3N1pHP7c

Malware Config

Targets

    • Target

      4bb0de84d1a866bc340b00c69a0b7fd0_NeikiAnalytics.exe

    • Size

      1.6MB

    • MD5

      4bb0de84d1a866bc340b00c69a0b7fd0

    • SHA1

      32d296de985df4fcebcb765ea25a63084a2e2317

    • SHA256

      c322ac9dcb6385b208020f0887f32cea5a2cd514d7b6e1f3d3195f588778efbf

    • SHA512

      e6b68a0ba269e44c4337c86f671d606e67a8751b96ab969433e83ccea7077e9f1cb25a264eb8fa42f50237a99218241154c8db1ddc0d1fd10603f201bc80dd5d

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkUCCWvLEvjuJoz5XdUK6S1uBkr5Gqlfz+y7p9Dbkj:Lz071uv4BPMkHC0I6Gz3N1pHP7c

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks