General

  • Target

    4149bbdc006a3dd13468787e9e3cf7d0_NeikiAnalytics.exe

  • Size

    2.9MB

  • Sample

    240528-ne8wasaa44

  • MD5

    4149bbdc006a3dd13468787e9e3cf7d0

  • SHA1

    78e6859c61af4ab159c3f0bc551e3f83c8ef6bab

  • SHA256

    0a204a3bda94c48de91e9fd46034216e7f3bb9fa561577d251db96da8903c3fc

  • SHA512

    4bd553e6271496d5c89d8dd5f18d4bf4825b76844ddab5599773097b68e70007334e178c135bfaf1a82eacfa9b34a8c99066538c4ca275c1f28f9bd3409e4825

  • SSDEEP

    49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IEFToFg:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RU

Malware Config

Targets

    • Target

      4149bbdc006a3dd13468787e9e3cf7d0_NeikiAnalytics.exe

    • Size

      2.9MB

    • MD5

      4149bbdc006a3dd13468787e9e3cf7d0

    • SHA1

      78e6859c61af4ab159c3f0bc551e3f83c8ef6bab

    • SHA256

      0a204a3bda94c48de91e9fd46034216e7f3bb9fa561577d251db96da8903c3fc

    • SHA512

      4bd553e6271496d5c89d8dd5f18d4bf4825b76844ddab5599773097b68e70007334e178c135bfaf1a82eacfa9b34a8c99066538c4ca275c1f28f9bd3409e4825

    • SSDEEP

      49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IEFToFg:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RU

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks