General

  • Target

    6b567b17aeb3ba160d8981a7ed2df7d0_NeikiAnalytics.exe

  • Size

    4.3MB

  • Sample

    240613-jxnkvszfrb

  • MD5

    6b567b17aeb3ba160d8981a7ed2df7d0

  • SHA1

    e0c63c2ea6c509ffe19133c42bb50a008d63291f

  • SHA256

    41524ec62e01d2bf5f0a54989c709b27279c3b7fdc01bf88ec79610fcbe8f7b3

  • SHA512

    f22bd74abf4ca16ebbb8eddb0c7291fe3424f37e02c722ff0aba6630eb85a77faefff917d88747c1dd833b96352e5dcaf2aeb8010747dd1952165e902e783e1d

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrW3:7bBeSFkb

Malware Config

Targets

    • Target

      6b567b17aeb3ba160d8981a7ed2df7d0_NeikiAnalytics.exe

    • Size

      4.3MB

    • MD5

      6b567b17aeb3ba160d8981a7ed2df7d0

    • SHA1

      e0c63c2ea6c509ffe19133c42bb50a008d63291f

    • SHA256

      41524ec62e01d2bf5f0a54989c709b27279c3b7fdc01bf88ec79610fcbe8f7b3

    • SHA512

      f22bd74abf4ca16ebbb8eddb0c7291fe3424f37e02c722ff0aba6630eb85a77faefff917d88747c1dd833b96352e5dcaf2aeb8010747dd1952165e902e783e1d

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrW3:7bBeSFkb

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Command and Control

Web Service

1
T1102

Tasks