General

  • Target

    1725e4b23ea8832d23e88fdce51749f0_NeikiAnalytics.exe

  • Size

    1.8MB

  • Sample

    240609-jzljaagf94

  • MD5

    1725e4b23ea8832d23e88fdce51749f0

  • SHA1

    3573e56d18b286dd85d3976208f874aa411af11e

  • SHA256

    932978ac1ef440c143a1df3364a058fb0f626360b53c0a2661cc270d8aff3785

  • SHA512

    7e0d43742112a71a8f35abd1a01a099a220327f6722d2bdb81c5c67889f411d79cfebd9b201f00bbd45f2ef13bc9b36c94a9acf66b4563146336285623032a4a

  • SSDEEP

    49152:Lz071uv4BPMkHC0IlnASEx/mi1D+F1E8W:NABX

Malware Config

Targets

    • Target

      1725e4b23ea8832d23e88fdce51749f0_NeikiAnalytics.exe

    • Size

      1.8MB

    • MD5

      1725e4b23ea8832d23e88fdce51749f0

    • SHA1

      3573e56d18b286dd85d3976208f874aa411af11e

    • SHA256

      932978ac1ef440c143a1df3364a058fb0f626360b53c0a2661cc270d8aff3785

    • SHA512

      7e0d43742112a71a8f35abd1a01a099a220327f6722d2bdb81c5c67889f411d79cfebd9b201f00bbd45f2ef13bc9b36c94a9acf66b4563146336285623032a4a

    • SSDEEP

      49152:Lz071uv4BPMkHC0IlnASEx/mi1D+F1E8W:NABX

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks