General

  • Target

    50c6c8d132d9283ef923c236c36ff090_NeikiAnalytics.exe

  • Size

    2.9MB

  • Sample

    240607-m2jz1sfb7v

  • MD5

    50c6c8d132d9283ef923c236c36ff090

  • SHA1

    74c9fea91dadd0e36514d312506d27c8549e1d7e

  • SHA256

    96765a91b6f6597b00c9d7904ac3e7b6a2975d67d9482fd68a0944ee77eea276

  • SHA512

    5ef96e3f912197082e9bd031429e5b6efb67b653a5f6f1e354c73d3c2077930c3caf73791fff76a08990d7e20d05cd5a26b7ef00af359d1a91ec6fc14d04a318

  • SSDEEP

    49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkFfdk2a2yKmktEf:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RF

Malware Config

Targets

    • Target

      50c6c8d132d9283ef923c236c36ff090_NeikiAnalytics.exe

    • Size

      2.9MB

    • MD5

      50c6c8d132d9283ef923c236c36ff090

    • SHA1

      74c9fea91dadd0e36514d312506d27c8549e1d7e

    • SHA256

      96765a91b6f6597b00c9d7904ac3e7b6a2975d67d9482fd68a0944ee77eea276

    • SHA512

      5ef96e3f912197082e9bd031429e5b6efb67b653a5f6f1e354c73d3c2077930c3caf73791fff76a08990d7e20d05cd5a26b7ef00af359d1a91ec6fc14d04a318

    • SSDEEP

      49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkFfdk2a2yKmktEf:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RF

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks