General

  • Target

    6abe58c6e04c65b2c397e3c9335059e0_NeikiAnalytics.exe

  • Size

    1.6MB

  • Sample

    240523-bmeafagd24

  • MD5

    6abe58c6e04c65b2c397e3c9335059e0

  • SHA1

    90254e09379491fcabb10177f4bf100d726bf378

  • SHA256

    1dcc67d9d5590dab7cc1a2fe79544a287f66362ea6881b89b6f993ab08227f1d

  • SHA512

    80f6ad26e83c1d92b076466ceb76824a5c4859c2984d4d32205897ac9b28060545617a251a6ea750ca657eba2ccf1192c571583637ea4a24d1bb6aa6ff23c536

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Q1szp5NnNvZWNChZ7fI+BJBxyODsbJEb:Lz071uv4BPMkyW10/w16BvZXBCurmK

Malware Config

Targets

    • Target

      6abe58c6e04c65b2c397e3c9335059e0_NeikiAnalytics.exe

    • Size

      1.6MB

    • MD5

      6abe58c6e04c65b2c397e3c9335059e0

    • SHA1

      90254e09379491fcabb10177f4bf100d726bf378

    • SHA256

      1dcc67d9d5590dab7cc1a2fe79544a287f66362ea6881b89b6f993ab08227f1d

    • SHA512

      80f6ad26e83c1d92b076466ceb76824a5c4859c2984d4d32205897ac9b28060545617a251a6ea750ca657eba2ccf1192c571583637ea4a24d1bb6aa6ff23c536

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Q1szp5NnNvZWNChZ7fI+BJBxyODsbJEb:Lz071uv4BPMkyW10/w16BvZXBCurmK

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks