General

  • Target

    152d315eb840feaf1f886964472fa4c0_NeikiAnalytics.exe

  • Size

    1.8MB

  • Sample

    240527-bwj72sbd91

  • MD5

    152d315eb840feaf1f886964472fa4c0

  • SHA1

    6be7ad864e9e3e3bde318ec92538acf914aa36fb

  • SHA256

    c93549d8d6ac75b40fc1e7a121215ffc4b5da5a621ac000660fe61c0f06a4341

  • SHA512

    524e87714d881144f327ae609e89d6a80e49a6c2555d65b2d8dfec7102bf1e1eb98278b725a4afc34ab40e6d54a9bb1ce51f23bc69c37b4bf5be49346c276f9d

  • SSDEEP

    49152:Lz071uv4BPMkHC0IaSEzQR4iRFlX+IADwsO:NABg

Malware Config

Targets

    • Target

      152d315eb840feaf1f886964472fa4c0_NeikiAnalytics.exe

    • Size

      1.8MB

    • MD5

      152d315eb840feaf1f886964472fa4c0

    • SHA1

      6be7ad864e9e3e3bde318ec92538acf914aa36fb

    • SHA256

      c93549d8d6ac75b40fc1e7a121215ffc4b5da5a621ac000660fe61c0f06a4341

    • SHA512

      524e87714d881144f327ae609e89d6a80e49a6c2555d65b2d8dfec7102bf1e1eb98278b725a4afc34ab40e6d54a9bb1ce51f23bc69c37b4bf5be49346c276f9d

    • SSDEEP

      49152:Lz071uv4BPMkHC0IaSEzQR4iRFlX+IADwsO:NABg

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks