General

  • Target

    a49793c7e6e555ace506958fc8167320_NeikiAnalytics.exe

  • Size

    1.5MB

  • Sample

    240603-qgkbtsha45

  • MD5

    a49793c7e6e555ace506958fc8167320

  • SHA1

    88dca78cfb8c87f7e100efc84aabcad86375030f

  • SHA256

    19bf6d3c66a8b8237b5cc15d5da2e2c238a7dc52bacbcc85bb006e56664bd191

  • SHA512

    06b69d62b9c7ed9fb130ad137b4e45a83858d925d7569b3f172262d9b324f2ec4f446cf5678dba1a4fa4e67f36046b533d707c77dd361e2441399629ccea0674

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkibTJH+2Q/ynKeWYXYcstOyl5EDbjpvZLUe:Lz071uv4BPMkibTIA5UIH

Malware Config

Targets

    • Target

      a49793c7e6e555ace506958fc8167320_NeikiAnalytics.exe

    • Size

      1.5MB

    • MD5

      a49793c7e6e555ace506958fc8167320

    • SHA1

      88dca78cfb8c87f7e100efc84aabcad86375030f

    • SHA256

      19bf6d3c66a8b8237b5cc15d5da2e2c238a7dc52bacbcc85bb006e56664bd191

    • SHA512

      06b69d62b9c7ed9fb130ad137b4e45a83858d925d7569b3f172262d9b324f2ec4f446cf5678dba1a4fa4e67f36046b533d707c77dd361e2441399629ccea0674

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkibTJH+2Q/ynKeWYXYcstOyl5EDbjpvZLUe:Lz071uv4BPMkibTIA5UIH

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks