General

  • Target

    47a59c59d3ae78287229e8f034e23e00_NeikiAnalytics.exe

  • Size

    1.7MB

  • Sample

    240605-hwcljahb3t

  • MD5

    47a59c59d3ae78287229e8f034e23e00

  • SHA1

    feaa9618116598b736100bce25852893db93f669

  • SHA256

    b0f6195f115c9ba24f0d79572977e0f6891cdce184ba77e532258f8b7ced0f1c

  • SHA512

    06f8e273a77e065ac6dc503b1fe563ac22a48f2e78a58181b68c15ae21f04aaea53b2abac407ce9284b67d878e288d1b6d6c0edc211b37d4f8abac28307cf3af

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Q1szp5NnNvZWNChZ7fI+7RrTFl6hvVjZ:Lz071uv4BPMkyW10/w16BvZX71Fq86P

Malware Config

Targets

    • Target

      47a59c59d3ae78287229e8f034e23e00_NeikiAnalytics.exe

    • Size

      1.7MB

    • MD5

      47a59c59d3ae78287229e8f034e23e00

    • SHA1

      feaa9618116598b736100bce25852893db93f669

    • SHA256

      b0f6195f115c9ba24f0d79572977e0f6891cdce184ba77e532258f8b7ced0f1c

    • SHA512

      06f8e273a77e065ac6dc503b1fe563ac22a48f2e78a58181b68c15ae21f04aaea53b2abac407ce9284b67d878e288d1b6d6c0edc211b37d4f8abac28307cf3af

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Q1szp5NnNvZWNChZ7fI+7RrTFl6hvVjZ:Lz071uv4BPMkyW10/w16BvZX71Fq86P

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks