General

  • Target

    0f9299bb3ce988bf0e29b140ac2901f0_NeikiAnalytics.exe

  • Size

    3.6MB

  • Sample

    240603-26y23ace7w

  • MD5

    0f9299bb3ce988bf0e29b140ac2901f0

  • SHA1

    f1532bb9a2febfed93e89c2b0d0e459d2cb44027

  • SHA256

    1dd3d9deeeb32235e4e797df605e661c56bfb17bcfb213f447839dd93456822f

  • SHA512

    01e262e55ad883296f4c93cdba8ac606c75384bd06d12f9fea3fabbfe9e2ef343d423439805babd2667eb6973c6b063bb27c2248c3e0b83dc95118f072ef011c

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWV:7bBeSFkh

Malware Config

Targets

    • Target

      0f9299bb3ce988bf0e29b140ac2901f0_NeikiAnalytics.exe

    • Size

      3.6MB

    • MD5

      0f9299bb3ce988bf0e29b140ac2901f0

    • SHA1

      f1532bb9a2febfed93e89c2b0d0e459d2cb44027

    • SHA256

      1dd3d9deeeb32235e4e797df605e661c56bfb17bcfb213f447839dd93456822f

    • SHA512

      01e262e55ad883296f4c93cdba8ac606c75384bd06d12f9fea3fabbfe9e2ef343d423439805babd2667eb6973c6b063bb27c2248c3e0b83dc95118f072ef011c

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWV:7bBeSFkh

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks