General

  • Target

    47708a21d646146dbbb1e525dee836f0_NeikiAnalytics.exe

  • Size

    2.0MB

  • Sample

    240529-gm2zdsce7v

  • MD5

    47708a21d646146dbbb1e525dee836f0

  • SHA1

    b329f2fbbd27b076e28009165ec8887dce9a2b4e

  • SHA256

    a8cb94ec689b154455786cc8d2527b5ac152bc7ac857b4a1dab12c3dfe384161

  • SHA512

    303126f616d729a7b005345e244fd0ee0778d4f56b3caeb3828c6cb8ff6f503ed6f8ddc5e4846c92d5a2b90a7314f5ce183070564e8b9b355ee33e7e2bb487e8

  • SSDEEP

    49152:BezaTF8FcNkNdfE0pZ9ozt4wIC5aIwC+Agr6KI3k:BemTLkNdfE0pZrws

Malware Config

Targets

    • Target

      47708a21d646146dbbb1e525dee836f0_NeikiAnalytics.exe

    • Size

      2.0MB

    • MD5

      47708a21d646146dbbb1e525dee836f0

    • SHA1

      b329f2fbbd27b076e28009165ec8887dce9a2b4e

    • SHA256

      a8cb94ec689b154455786cc8d2527b5ac152bc7ac857b4a1dab12c3dfe384161

    • SHA512

      303126f616d729a7b005345e244fd0ee0778d4f56b3caeb3828c6cb8ff6f503ed6f8ddc5e4846c92d5a2b90a7314f5ce183070564e8b9b355ee33e7e2bb487e8

    • SSDEEP

      49152:BezaTF8FcNkNdfE0pZ9ozt4wIC5aIwC+Agr6KI3k:BemTLkNdfE0pZrws

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks