General

  • Target

    950dc233ecf28175ff36817b8da52ea0_NeikiAnalytics.exe

  • Size

    3.1MB

  • Sample

    240614-a8vnwayckg

  • MD5

    950dc233ecf28175ff36817b8da52ea0

  • SHA1

    b7e508f8acef66e5da525837df1bed779ec583ad

  • SHA256

    6812d4c8f609b52158b1765f60aba97fa7d07a8eabb18a160cbd973ee740be31

  • SHA512

    47baf0cdd60fd9c8ab83ad5751e0e473ce4b68877e3726f32623eeab8b7db78d701492e06900f4fd88d0be316697d555235cedd6ec0e988701977b7b9168324e

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWv:7bBeSFkr

Malware Config

Targets

    • Target

      950dc233ecf28175ff36817b8da52ea0_NeikiAnalytics.exe

    • Size

      3.1MB

    • MD5

      950dc233ecf28175ff36817b8da52ea0

    • SHA1

      b7e508f8acef66e5da525837df1bed779ec583ad

    • SHA256

      6812d4c8f609b52158b1765f60aba97fa7d07a8eabb18a160cbd973ee740be31

    • SHA512

      47baf0cdd60fd9c8ab83ad5751e0e473ce4b68877e3726f32623eeab8b7db78d701492e06900f4fd88d0be316697d555235cedd6ec0e988701977b7b9168324e

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWv:7bBeSFkr

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks