General

  • Target

    2ab4fdb5f8e30663bdf71bcab4f47b30_NeikiAnalytics.exe

  • Size

    1.9MB

  • Sample

    240612-j6xvwswanl

  • MD5

    2ab4fdb5f8e30663bdf71bcab4f47b30

  • SHA1

    5b6c2cb815c51bf1dd673fbbdfb5d4e7075ce2d5

  • SHA256

    c6fd617a8631d95920bfcb7e25161d8b2853f38fb822e2be1facdcd578491be6

  • SHA512

    43a862538c1ddd01061483892c32b805927c2a32acccc7856ea2b2bf6fbc9a39fe6453b92964b4378a17ec8d309602b053906a93e6ec2097cd2c9b254ba8c5bc

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkibTJH+2Q/ynKeWY1s38kQu12bPxvyuzaBgJ9pcFto:Lz071uv4BPMkibTIA5I4TNrpDGfFzczF

Malware Config

Targets

    • Target

      2ab4fdb5f8e30663bdf71bcab4f47b30_NeikiAnalytics.exe

    • Size

      1.9MB

    • MD5

      2ab4fdb5f8e30663bdf71bcab4f47b30

    • SHA1

      5b6c2cb815c51bf1dd673fbbdfb5d4e7075ce2d5

    • SHA256

      c6fd617a8631d95920bfcb7e25161d8b2853f38fb822e2be1facdcd578491be6

    • SHA512

      43a862538c1ddd01061483892c32b805927c2a32acccc7856ea2b2bf6fbc9a39fe6453b92964b4378a17ec8d309602b053906a93e6ec2097cd2c9b254ba8c5bc

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkibTJH+2Q/ynKeWY1s38kQu12bPxvyuzaBgJ9pcFto:Lz071uv4BPMkibTIA5I4TNrpDGfFzczF

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks