General

  • Target

    41a51ade978ff76a1a749a6bcab39d00_NeikiAnalytics.exe

  • Size

    3.1MB

  • Sample

    240612-y8qxpasgkq

  • MD5

    41a51ade978ff76a1a749a6bcab39d00

  • SHA1

    dc29efc01cba0252cac216b5a12aa184ede41741

  • SHA256

    c96e6598ad2948b20abd2bcc187b83f4c76eb54231489eb578703a16f2f35321

  • SHA512

    fe3822aa8d6435f67ee497f0426bc2889a069f23f0047d066fc9962be03288f195cd637f47ac5ccf09e0b0fa12047167d8fdbdec52627a9cc0c6b1d684efd71f

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWU:7bBeSFkg

Malware Config

Targets

    • Target

      41a51ade978ff76a1a749a6bcab39d00_NeikiAnalytics.exe

    • Size

      3.1MB

    • MD5

      41a51ade978ff76a1a749a6bcab39d00

    • SHA1

      dc29efc01cba0252cac216b5a12aa184ede41741

    • SHA256

      c96e6598ad2948b20abd2bcc187b83f4c76eb54231489eb578703a16f2f35321

    • SHA512

      fe3822aa8d6435f67ee497f0426bc2889a069f23f0047d066fc9962be03288f195cd637f47ac5ccf09e0b0fa12047167d8fdbdec52627a9cc0c6b1d684efd71f

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWU:7bBeSFkg

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks