General

  • Target

    0b99401e16ab2635060307c82cd016afbd421cd899887dc5c91cf2f885ab9c8d_NeikiAnalytics.exe

  • Size

    2.2MB

  • Sample

    240628-w7cybsydna

  • MD5

    f34308db10fb29103bc16b28dbe6fb40

  • SHA1

    8c9445ac5e84768200da607607db20649e9452c9

  • SHA256

    0b99401e16ab2635060307c82cd016afbd421cd899887dc5c91cf2f885ab9c8d

  • SHA512

    d12c27067f54b8f60da44231c5534773a7a110a90f63fb7004abcd625dab9b193d69cd2d976605f644c9675102af534f85b9be1cb20e7fd70fa5817bd81b4ec8

  • SSDEEP

    49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hm6l+XPR2d:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RO

Malware Config

Targets

    • Target

      0b99401e16ab2635060307c82cd016afbd421cd899887dc5c91cf2f885ab9c8d_NeikiAnalytics.exe

    • Size

      2.2MB

    • MD5

      f34308db10fb29103bc16b28dbe6fb40

    • SHA1

      8c9445ac5e84768200da607607db20649e9452c9

    • SHA256

      0b99401e16ab2635060307c82cd016afbd421cd899887dc5c91cf2f885ab9c8d

    • SHA512

      d12c27067f54b8f60da44231c5534773a7a110a90f63fb7004abcd625dab9b193d69cd2d976605f644c9675102af534f85b9be1cb20e7fd70fa5817bd81b4ec8

    • SSDEEP

      49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hm6l+XPR2d:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RO

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks