General

  • Target

    24c85a8088c4aaf151b40ca89f433323ef2f0f2367aee1baac35e38c899b28db_NeikiAnalytics.exe

  • Size

    1.7MB

  • Sample

    240624-azrkvs1bla

  • MD5

    00915893fe8492f4c182e4f4cdc011c0

  • SHA1

    8e1ee2c4eb75160aeb50050c5a4a39956c411e34

  • SHA256

    24c85a8088c4aaf151b40ca89f433323ef2f0f2367aee1baac35e38c899b28db

  • SHA512

    88851009e2b626f978d3aeeb1fa4baae4ad4eac3e16074e0ead1d37998939cc7c2b8e2d5f04692047348037c41ad87ec7e2d3340bf29ca83bcb6bfa4739f9f3a

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Qk7SW7r+kQQ7dXQARBa5e0ag2K0hvL78:Lz071uv4BPMkyW10/wKV7hjSe05c2zr

Malware Config

Targets

    • Target

      24c85a8088c4aaf151b40ca89f433323ef2f0f2367aee1baac35e38c899b28db_NeikiAnalytics.exe

    • Size

      1.7MB

    • MD5

      00915893fe8492f4c182e4f4cdc011c0

    • SHA1

      8e1ee2c4eb75160aeb50050c5a4a39956c411e34

    • SHA256

      24c85a8088c4aaf151b40ca89f433323ef2f0f2367aee1baac35e38c899b28db

    • SHA512

      88851009e2b626f978d3aeeb1fa4baae4ad4eac3e16074e0ead1d37998939cc7c2b8e2d5f04692047348037c41ad87ec7e2d3340bf29ca83bcb6bfa4739f9f3a

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Qk7SW7r+kQQ7dXQARBa5e0ag2K0hvL78:Lz071uv4BPMkyW10/wKV7hjSe05c2zr

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks