General

  • Target

    83b58209eca8af0c1ffb70f20f248980_NeikiAnalytics.exe

  • Size

    5.3MB

  • Sample

    240531-262sysha5x

  • MD5

    83b58209eca8af0c1ffb70f20f248980

  • SHA1

    79d4a419313c14b541b63b277173017a8fc810db

  • SHA256

    cb00c812a1a82c757dd0cfa3fb50ea8542e84031742a45116617a353eaf01acd

  • SHA512

    1911439ff7a5391cd3d1276fe7b16ff0bd0bcac10f27ea40398cbbcd42449315de43f4e8f54908d4f985a4d8831029fa292bc3f238bad3a0fce88a16aba03b67

  • SSDEEP

    98304:xRjPz9KDzUU8O5/B/LJ25E9SVh86sS3TRknQ3ss2MApp9meypA3cPDu7:xFKoU8O5/b2XViSjX310SeyGc7u7

Malware Config

Targets

    • Target

      83b58209eca8af0c1ffb70f20f248980_NeikiAnalytics.exe

    • Size

      5.3MB

    • MD5

      83b58209eca8af0c1ffb70f20f248980

    • SHA1

      79d4a419313c14b541b63b277173017a8fc810db

    • SHA256

      cb00c812a1a82c757dd0cfa3fb50ea8542e84031742a45116617a353eaf01acd

    • SHA512

      1911439ff7a5391cd3d1276fe7b16ff0bd0bcac10f27ea40398cbbcd42449315de43f4e8f54908d4f985a4d8831029fa292bc3f238bad3a0fce88a16aba03b67

    • SSDEEP

      98304:xRjPz9KDzUU8O5/B/LJ25E9SVh86sS3TRknQ3ss2MApp9meypA3cPDu7:xFKoU8O5/b2XViSjX310SeyGc7u7

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks