General

  • Target

    1f688456c8adbbc1ca72100b7f4ff090_NeikiAnalytics.exe

  • Size

    1.2MB

  • Sample

    240602-b812bsfd54

  • MD5

    1f688456c8adbbc1ca72100b7f4ff090

  • SHA1

    3724c657147fa9e2998d1eb673b2ebecff11ca28

  • SHA256

    eb586cf76d7349f3e347cb1642440b513394dd540c01a2622265c227199437ea

  • SHA512

    1896243c8976a92380cb9fbacbd6ebb700246ed188d196fefcd0a002d32d97c5631d7759730ae392f211c8c9c9849c314e9719f8fb89ea0479006461e44da076

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMk+AWe9qyCApCPRlKAHtlU:Lz071uv4BPMk+QqPlu

Malware Config

Targets

    • Target

      1f688456c8adbbc1ca72100b7f4ff090_NeikiAnalytics.exe

    • Size

      1.2MB

    • MD5

      1f688456c8adbbc1ca72100b7f4ff090

    • SHA1

      3724c657147fa9e2998d1eb673b2ebecff11ca28

    • SHA256

      eb586cf76d7349f3e347cb1642440b513394dd540c01a2622265c227199437ea

    • SHA512

      1896243c8976a92380cb9fbacbd6ebb700246ed188d196fefcd0a002d32d97c5631d7759730ae392f211c8c9c9849c314e9719f8fb89ea0479006461e44da076

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMk+AWe9qyCApCPRlKAHtlU:Lz071uv4BPMk+QqPlu

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks