General

  • Target

    67fc746925440da87e4907a63472f280_NeikiAnalytics.exe

  • Size

    2.9MB

  • Sample

    240523-bcwrqsfh42

  • MD5

    67fc746925440da87e4907a63472f280

  • SHA1

    d2aaecaf9d29462c1d5f8ee47be057a35d98f152

  • SHA256

    e603a2f1cef6791a2e6fe7a5c34b5442b6edb8cba9815d41f2a38f606e86b8d2

  • SHA512

    3836f33940274d2a81392886505776ac0999a60247f4387b555706fbe032af56c5e4709a8c2563d3a16ae5a7d3c1d2a84fed1d6bbbe9112f3990c3d2e707c4ab

  • SSDEEP

    49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkFfdk2a2yKmkd2:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2Rx

Malware Config

Targets

    • Target

      67fc746925440da87e4907a63472f280_NeikiAnalytics.exe

    • Size

      2.9MB

    • MD5

      67fc746925440da87e4907a63472f280

    • SHA1

      d2aaecaf9d29462c1d5f8ee47be057a35d98f152

    • SHA256

      e603a2f1cef6791a2e6fe7a5c34b5442b6edb8cba9815d41f2a38f606e86b8d2

    • SHA512

      3836f33940274d2a81392886505776ac0999a60247f4387b555706fbe032af56c5e4709a8c2563d3a16ae5a7d3c1d2a84fed1d6bbbe9112f3990c3d2e707c4ab

    • SSDEEP

      49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkFfdk2a2yKmkd2:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2Rx

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks