General

  • Target

    6d2a89229cb3d9e4a3f60569aa409850_NeikiAnalytics.exe

  • Size

    5.1MB

  • Sample

    240523-bvwjpage9y

  • MD5

    6d2a89229cb3d9e4a3f60569aa409850

  • SHA1

    11112da50db3919e323978625a6de21a85536990

  • SHA256

    f50d1c243dd26214fd8735640089371f4177f6a9ce1c717721893c14f4c2194a

  • SHA512

    0ce0db4dc5fc4c6c70191bdafb6f180ba3b8d583db483b1822f1828fd2044ed7c5ca142ab5146b9cf8bdf4cbed807e9ce328fd2e9f1b8341e2d4e72c8dfb6cac

  • SSDEEP

    98304:1jnwHesJeZ+jzZoSr0fHqjjOGMuH8G+KVCP5nO6HCLsez3Xdh3pU9YNYIVy:1Ees1RlIfUzMuf+h5NmHH336d

Malware Config

Targets

    • Target

      6d2a89229cb3d9e4a3f60569aa409850_NeikiAnalytics.exe

    • Size

      5.1MB

    • MD5

      6d2a89229cb3d9e4a3f60569aa409850

    • SHA1

      11112da50db3919e323978625a6de21a85536990

    • SHA256

      f50d1c243dd26214fd8735640089371f4177f6a9ce1c717721893c14f4c2194a

    • SHA512

      0ce0db4dc5fc4c6c70191bdafb6f180ba3b8d583db483b1822f1828fd2044ed7c5ca142ab5146b9cf8bdf4cbed807e9ce328fd2e9f1b8341e2d4e72c8dfb6cac

    • SSDEEP

      98304:1jnwHesJeZ+jzZoSr0fHqjjOGMuH8G+KVCP5nO6HCLsez3Xdh3pU9YNYIVy:1Ees1RlIfUzMuf+h5NmHH336d

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Drops file in Drivers directory

    • Stops running service(s)

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks