General

  • Target

    500631428c2f106c6bd2289cda54c940_NeikiAnalytics.exe

  • Size

    2.0MB

  • Sample

    240522-2qwa8sbh89

  • MD5

    500631428c2f106c6bd2289cda54c940

  • SHA1

    47f235f9bda6201e63aa738460a21d078fc6d071

  • SHA256

    669201a20e3ca8ba5320b70a8c4e3bf75e5305570fadfb1f0432598b212d074a

  • SHA512

    8831e3a9c71a47f3e2ad6f485aaa58eb26fa3196586c9042a339b08d3f941992ce1c52af0dd3749b1d503768986c145f2d2cd139dbdc49f8c1176c4b80e6c605

  • SSDEEP

    49152:BezaTF8FcNkNdfE0pZ9ozt4wIQUUvlhqLr2+W4/:BemTLkNdfE0pZrQo

Score
10/10

Malware Config

Targets

    • Target

      500631428c2f106c6bd2289cda54c940_NeikiAnalytics.exe

    • Size

      2.0MB

    • MD5

      500631428c2f106c6bd2289cda54c940

    • SHA1

      47f235f9bda6201e63aa738460a21d078fc6d071

    • SHA256

      669201a20e3ca8ba5320b70a8c4e3bf75e5305570fadfb1f0432598b212d074a

    • SHA512

      8831e3a9c71a47f3e2ad6f485aaa58eb26fa3196586c9042a339b08d3f941992ce1c52af0dd3749b1d503768986c145f2d2cd139dbdc49f8c1176c4b80e6c605

    • SSDEEP

      49152:BezaTF8FcNkNdfE0pZ9ozt4wIQUUvlhqLr2+W4/:BemTLkNdfE0pZrQo

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks