General

  • Target

    7ba638cbb281201a32fd801a2ae23b00_NeikiAnalytics.exe

  • Size

    2.9MB

  • Sample

    240613-ph6qsasekn

  • MD5

    7ba638cbb281201a32fd801a2ae23b00

  • SHA1

    cd1babbac39572235a9f663898cd5727e9dc5814

  • SHA256

    416502f96459f3c1475cbcce364b8baf80c150f65111bb68041ad64e5c5c690a

  • SHA512

    28e9cbc8a9b723a3073db84c815ebdf8dc28b1b64ead9078ccd4cc5c48eb4a823e79ebd542ff5c5686a420ee0f96fd98c9677db08cf4de2a2f269f11e5292c51

  • SSDEEP

    49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/Rks:71ONtyBeSFkXV1etEKLlWUTOfeiRA2Ro

Malware Config

Targets

    • Target

      7ba638cbb281201a32fd801a2ae23b00_NeikiAnalytics.exe

    • Size

      2.9MB

    • MD5

      7ba638cbb281201a32fd801a2ae23b00

    • SHA1

      cd1babbac39572235a9f663898cd5727e9dc5814

    • SHA256

      416502f96459f3c1475cbcce364b8baf80c150f65111bb68041ad64e5c5c690a

    • SHA512

      28e9cbc8a9b723a3073db84c815ebdf8dc28b1b64ead9078ccd4cc5c48eb4a823e79ebd542ff5c5686a420ee0f96fd98c9677db08cf4de2a2f269f11e5292c51

    • SSDEEP

      49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/Rks:71ONtyBeSFkXV1etEKLlWUTOfeiRA2Ro

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Command and Control

Web Service

1
T1102

Tasks