General

  • Target

    1909f5a6f5ebeb6164bfab41ace4e1c0_NeikiAnalytics.exe

  • Size

    3.0MB

  • Sample

    240610-rc8djaygjp

  • MD5

    1909f5a6f5ebeb6164bfab41ace4e1c0

  • SHA1

    e4ff6bc806644ab440b31348b1204e7df610ff4c

  • SHA256

    f96b33a71af65748cf51575aa89256ec1ae09fe814acfc8be4dddffd04d52abe

  • SHA512

    6d27e29af4766f31d4899e0492988eafffafab747a5ef89d5042630246e8225606f91bfc1709b094cd8f6f19e877cdb2bb168af8cec47441d99682a192795d80

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWi:7bBeSFku

Malware Config

Targets

    • Target

      1909f5a6f5ebeb6164bfab41ace4e1c0_NeikiAnalytics.exe

    • Size

      3.0MB

    • MD5

      1909f5a6f5ebeb6164bfab41ace4e1c0

    • SHA1

      e4ff6bc806644ab440b31348b1204e7df610ff4c

    • SHA256

      f96b33a71af65748cf51575aa89256ec1ae09fe814acfc8be4dddffd04d52abe

    • SHA512

      6d27e29af4766f31d4899e0492988eafffafab747a5ef89d5042630246e8225606f91bfc1709b094cd8f6f19e877cdb2bb168af8cec47441d99682a192795d80

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWi:7bBeSFku

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks