General

  • Target

    13fb97568370ad9ff2345770e4ccfd50_NeikiAnalytics.exe

  • Size

    1.3MB

  • Sample

    240528-2yqeysha46

  • MD5

    13fb97568370ad9ff2345770e4ccfd50

  • SHA1

    4f207137565a08acdbbbde4eb6036b410e3179e0

  • SHA256

    b1e078f2173021e8c936372da3b1020b7fe37d987d9d7e52cc641d796d19b261

  • SHA512

    1e0ff8057bdf26c3ffcee3c7fa40f80373ade4d23d2df2c5cec1766a76d31c37c4d04886d17181e432d9be21cd436646f7e88fac0e87ee8cd4eb0798e253e6e2

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMk+AWe9qyCAYYEEDNsvgG237+mJulOX1/LB2sG9:Lz071uv4BPMk+QqGRjj3LJR/LwZ

Malware Config

Targets

    • Target

      13fb97568370ad9ff2345770e4ccfd50_NeikiAnalytics.exe

    • Size

      1.3MB

    • MD5

      13fb97568370ad9ff2345770e4ccfd50

    • SHA1

      4f207137565a08acdbbbde4eb6036b410e3179e0

    • SHA256

      b1e078f2173021e8c936372da3b1020b7fe37d987d9d7e52cc641d796d19b261

    • SHA512

      1e0ff8057bdf26c3ffcee3c7fa40f80373ade4d23d2df2c5cec1766a76d31c37c4d04886d17181e432d9be21cd436646f7e88fac0e87ee8cd4eb0798e253e6e2

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMk+AWe9qyCAYYEEDNsvgG237+mJulOX1/LB2sG9:Lz071uv4BPMk+QqGRjj3LJR/LwZ

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks