General

  • Target

    1a4b07b92ed46657aa0dbaf55078fe10_NeikiAnalytics.exe

  • Size

    3.3MB

  • Sample

    240606-ztyjnada85

  • MD5

    1a4b07b92ed46657aa0dbaf55078fe10

  • SHA1

    5e9d498c3b714185abdbaee5c4a9d07520414505

  • SHA256

    9173b6348b2c768df18cf2972c1a195dca20b379d1fea3bb88ceeedeec4fc898

  • SHA512

    fc7161053bf10cd1e3696c65aee6202be6b3dfd091144a989f4e821be7be0a75a9bef5835e501313ba1a2388d761f0e77f5776ad5ba773f16d1ca20f7d7dd260

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWJ:7bBeSFkF

Malware Config

Targets

    • Target

      1a4b07b92ed46657aa0dbaf55078fe10_NeikiAnalytics.exe

    • Size

      3.3MB

    • MD5

      1a4b07b92ed46657aa0dbaf55078fe10

    • SHA1

      5e9d498c3b714185abdbaee5c4a9d07520414505

    • SHA256

      9173b6348b2c768df18cf2972c1a195dca20b379d1fea3bb88ceeedeec4fc898

    • SHA512

      fc7161053bf10cd1e3696c65aee6202be6b3dfd091144a989f4e821be7be0a75a9bef5835e501313ba1a2388d761f0e77f5776ad5ba773f16d1ca20f7d7dd260

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWJ:7bBeSFkF

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks