General

  • Target

    193f5014cf9645753665dbc4a13b2e40_NeikiAnalytics.exe

  • Size

    1.6MB

  • Sample

    240610-rg54zaydne

  • MD5

    193f5014cf9645753665dbc4a13b2e40

  • SHA1

    2460c7170007e9a5d0b93d614f29a840d9635af6

  • SHA256

    8743fd1f0fd7dc65657279b4d4f45aadee82a7e3d342ca42eb2d2380be69f1c2

  • SHA512

    9bea623f623ccb360130668d91a9563982231b298e1c986485d2fc220ee741e5633614091c5d119422f8e073b39f085ff108343c8e9f5346875d08d55428b0bf

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkibTJH+2Q/ynKeWYL+t6kw2bPUyYaKXgXScSFA9Ja:Lz071uv4BPMkibTIA5LDGTUXaDmB

Malware Config

Targets

    • Target

      193f5014cf9645753665dbc4a13b2e40_NeikiAnalytics.exe

    • Size

      1.6MB

    • MD5

      193f5014cf9645753665dbc4a13b2e40

    • SHA1

      2460c7170007e9a5d0b93d614f29a840d9635af6

    • SHA256

      8743fd1f0fd7dc65657279b4d4f45aadee82a7e3d342ca42eb2d2380be69f1c2

    • SHA512

      9bea623f623ccb360130668d91a9563982231b298e1c986485d2fc220ee741e5633614091c5d119422f8e073b39f085ff108343c8e9f5346875d08d55428b0bf

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkibTJH+2Q/ynKeWYL+t6kw2bPUyYaKXgXScSFA9Ja:Lz071uv4BPMkibTIA5LDGTUXaDmB

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks