General

  • Target

    ac361f372077203e8d6fe6dfea0aea1ac07756a0adfa8e3e51c1b82d13b9b165_NeikiAnalytics.exe

  • Size

    1.7MB

  • Sample

    240629-p343paxglb

  • MD5

    d058f07a6400c72f211ebacc2cad1030

  • SHA1

    bfd4bae46bddce19d839e432060f25e631dc190f

  • SHA256

    ac361f372077203e8d6fe6dfea0aea1ac07756a0adfa8e3e51c1b82d13b9b165

  • SHA512

    086b8bb90603bd6266fabd32210a62137637276f6968fcf5079a37c6985652bd5d61a0deb8c1c04ee3b73c3bd434841ad4e28300f253b1d61a5547696be06994

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkiptb8q33F1QeQthKJAc+StNfNuUv6asC22iJr+:Lz071uv4BPMkivwSbaMrf27C

Malware Config

Targets

    • Target

      ac361f372077203e8d6fe6dfea0aea1ac07756a0adfa8e3e51c1b82d13b9b165_NeikiAnalytics.exe

    • Size

      1.7MB

    • MD5

      d058f07a6400c72f211ebacc2cad1030

    • SHA1

      bfd4bae46bddce19d839e432060f25e631dc190f

    • SHA256

      ac361f372077203e8d6fe6dfea0aea1ac07756a0adfa8e3e51c1b82d13b9b165

    • SHA512

      086b8bb90603bd6266fabd32210a62137637276f6968fcf5079a37c6985652bd5d61a0deb8c1c04ee3b73c3bd434841ad4e28300f253b1d61a5547696be06994

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkiptb8q33F1QeQthKJAc+StNfNuUv6asC22iJr+:Lz071uv4BPMkivwSbaMrf27C

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks