General

  • Target

    832d1f144cfe1650fd41dd130b84a790_NeikiAnalytics.exe

  • Size

    3.3MB

  • Sample

    240608-cq7xlafe9y

  • MD5

    832d1f144cfe1650fd41dd130b84a790

  • SHA1

    109e95b692ea6ebd22dee457dce2dc961dd83fe7

  • SHA256

    6fc7d019b318275d9c6812a8bbeced34bdeacbef059b7720da5af2f6b9892c5c

  • SHA512

    19a3639fb1821697db5f813f4e59237e5c27ab290297e591a1cc080d25c1664e75bb8bde5f785378ad9c1c0e9800fe230e0e301aa67ee0df40e5c792691c4dfd

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWn:7bBeSFk7

Malware Config

Targets

    • Target

      832d1f144cfe1650fd41dd130b84a790_NeikiAnalytics.exe

    • Size

      3.3MB

    • MD5

      832d1f144cfe1650fd41dd130b84a790

    • SHA1

      109e95b692ea6ebd22dee457dce2dc961dd83fe7

    • SHA256

      6fc7d019b318275d9c6812a8bbeced34bdeacbef059b7720da5af2f6b9892c5c

    • SHA512

      19a3639fb1821697db5f813f4e59237e5c27ab290297e591a1cc080d25c1664e75bb8bde5f785378ad9c1c0e9800fe230e0e301aa67ee0df40e5c792691c4dfd

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWn:7bBeSFk7

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks