General

  • Target

    e147515ee18cd3955a789264d4e13470_NeikiAnalytics.exe

  • Size

    3.0MB

  • Sample

    240523-mwqklsdf31

  • MD5

    e147515ee18cd3955a789264d4e13470

  • SHA1

    2991e9775e09410b5f462e5cf38f8c2b50c998d3

  • SHA256

    047a7a9b5758a1448c7b178411dfcbdafa68c34aaf4a64fd5b6fb6675f9f5a41

  • SHA512

    fb05d3dd7874f47db7470977abe3d9d9bf2aba08f0abc5a88cdf14dd24759eaf6c36767622fdfc0f61fbb3017aa8b993cd3c978173691bb9d10a519ba9baeae4

  • SSDEEP

    98304:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWG:SbBeSFki

Malware Config

Targets

    • Target

      e147515ee18cd3955a789264d4e13470_NeikiAnalytics.exe

    • Size

      3.0MB

    • MD5

      e147515ee18cd3955a789264d4e13470

    • SHA1

      2991e9775e09410b5f462e5cf38f8c2b50c998d3

    • SHA256

      047a7a9b5758a1448c7b178411dfcbdafa68c34aaf4a64fd5b6fb6675f9f5a41

    • SHA512

      fb05d3dd7874f47db7470977abe3d9d9bf2aba08f0abc5a88cdf14dd24759eaf6c36767622fdfc0f61fbb3017aa8b993cd3c978173691bb9d10a519ba9baeae4

    • SSDEEP

      98304:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWG:SbBeSFki

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks