General

  • Target

    cccd348945fac8fe84adc58c971d2c90_NeikiAnalytics.exe

  • Size

    3.1MB

  • Sample

    240616-cpm6ssyhmj

  • MD5

    cccd348945fac8fe84adc58c971d2c90

  • SHA1

    a58a2db520a8678db43e41f218262dc255338b2f

  • SHA256

    94891b49a139efd0ceba384055f790d631df280a6cf0ab3f96dc27911118c22f

  • SHA512

    389e9e4633d24dd43bc61c18b2254e25d5576ee71ff050700bccf22a2f7c3735f353bffb619d1f1ca34883d173696ec36062863c5a05966baf566d80c023bd96

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWf:7bBeSFkb

Malware Config

Targets

    • Target

      cccd348945fac8fe84adc58c971d2c90_NeikiAnalytics.exe

    • Size

      3.1MB

    • MD5

      cccd348945fac8fe84adc58c971d2c90

    • SHA1

      a58a2db520a8678db43e41f218262dc255338b2f

    • SHA256

      94891b49a139efd0ceba384055f790d631df280a6cf0ab3f96dc27911118c22f

    • SHA512

      389e9e4633d24dd43bc61c18b2254e25d5576ee71ff050700bccf22a2f7c3735f353bffb619d1f1ca34883d173696ec36062863c5a05966baf566d80c023bd96

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWf:7bBeSFkb

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks