General

  • Target

    334d46a202316f4a08a77645a1c884e0_NeikiAnalytics.exe

  • Size

    2.5MB

  • Sample

    240604-gbae1afd88

  • MD5

    334d46a202316f4a08a77645a1c884e0

  • SHA1

    93cfa69eae5680766764af6ae42dea0415588b40

  • SHA256

    a54703b0d051cd66f67789f37e65ba3a7960bb22f3150199037d51c4944b7472

  • SHA512

    baa737e3d32145937ecd45ef927c8c0122b153005878f6db844bc9f0108a96242523ddbacb7901e4da1641ee287ac867cbdb41304ffc72f2aec61722e8e8b1f0

  • SSDEEP

    49152:BezaTF8FcNkNdfE0pZ9ozt4wIC5aIwC+Agr6tdlmU1/eoKw:BemTLkNdfE0pZrwZ

Malware Config

Targets

    • Target

      334d46a202316f4a08a77645a1c884e0_NeikiAnalytics.exe

    • Size

      2.5MB

    • MD5

      334d46a202316f4a08a77645a1c884e0

    • SHA1

      93cfa69eae5680766764af6ae42dea0415588b40

    • SHA256

      a54703b0d051cd66f67789f37e65ba3a7960bb22f3150199037d51c4944b7472

    • SHA512

      baa737e3d32145937ecd45ef927c8c0122b153005878f6db844bc9f0108a96242523ddbacb7901e4da1641ee287ac867cbdb41304ffc72f2aec61722e8e8b1f0

    • SSDEEP

      49152:BezaTF8FcNkNdfE0pZ9ozt4wIC5aIwC+Agr6tdlmU1/eoKw:BemTLkNdfE0pZrwZ

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks