General

  • Target

    a424e29a2c7b9bcada3cb4f14dc3d240_NeikiAnalytics.exe

  • Size

    2.9MB

  • Sample

    240603-p5775age87

  • MD5

    a424e29a2c7b9bcada3cb4f14dc3d240

  • SHA1

    52c0b1d959616151b7cbc349573448acdd8eb847

  • SHA256

    e8695b2333c5da18d4efcb093e86cf55db53a8dab92c72c82eefd9c2cc0a7305

  • SHA512

    41c63099caeb5fbd1f71c0460a68c2106d24759b935743299a46198a1363e9de4ec46aa2c3ab18fb10428a98c4f8c371db1d0d0acee25d56892850b9322e7ef8

  • SSDEEP

    49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/mi8:71ONtyBeSFkXV1etEKLlWUTOfeiRA2Rv

Malware Config

Targets

    • Target

      a424e29a2c7b9bcada3cb4f14dc3d240_NeikiAnalytics.exe

    • Size

      2.9MB

    • MD5

      a424e29a2c7b9bcada3cb4f14dc3d240

    • SHA1

      52c0b1d959616151b7cbc349573448acdd8eb847

    • SHA256

      e8695b2333c5da18d4efcb093e86cf55db53a8dab92c72c82eefd9c2cc0a7305

    • SHA512

      41c63099caeb5fbd1f71c0460a68c2106d24759b935743299a46198a1363e9de4ec46aa2c3ab18fb10428a98c4f8c371db1d0d0acee25d56892850b9322e7ef8

    • SSDEEP

      49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/mi8:71ONtyBeSFkXV1etEKLlWUTOfeiRA2Rv

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks