General

  • Target

    72a59d623298df6d4c97ca520370d0e0_NeikiAnalytics.exe

  • Size

    1.8MB

  • Sample

    240613-l1yw4stfkd

  • MD5

    72a59d623298df6d4c97ca520370d0e0

  • SHA1

    45e091e1f0635885d9661bf88d90d0e78e6c1bf3

  • SHA256

    03b6b52e2cf8b248e8c7e4192566c664d3d522892e071c099852c077ba20ee3d

  • SHA512

    7d7834b88ea9f278a9a54ba8a16420e69d8b731aaff6a8fcb49b20e137a17965983bea3d6458d10586770a57010f58aff3160ba9a60af3d18a482066b8465e33

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkUCCWvLEvjuJoCSxnhvuqAP9dbWmbOtP3SmZ5jNwYZ:Lz071uv4BPMkHC0I6GCInhG1dtAtYjyN

Malware Config

Targets

    • Target

      72a59d623298df6d4c97ca520370d0e0_NeikiAnalytics.exe

    • Size

      1.8MB

    • MD5

      72a59d623298df6d4c97ca520370d0e0

    • SHA1

      45e091e1f0635885d9661bf88d90d0e78e6c1bf3

    • SHA256

      03b6b52e2cf8b248e8c7e4192566c664d3d522892e071c099852c077ba20ee3d

    • SHA512

      7d7834b88ea9f278a9a54ba8a16420e69d8b731aaff6a8fcb49b20e137a17965983bea3d6458d10586770a57010f58aff3160ba9a60af3d18a482066b8465e33

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkUCCWvLEvjuJoCSxnhvuqAP9dbWmbOtP3SmZ5jNwYZ:Lz071uv4BPMkHC0I6GCInhG1dtAtYjyN

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Command and Control

Web Service

1
T1102

Tasks