General

  • Target

    b73397f4ecc0468df905734983b35a2a72b9082b941a0dcaa4f8bf530a0690a6_NeikiAnalytics.exe

  • Size

    1.6MB

  • Sample

    240629-w5xjysshqc

  • MD5

    4bab06dc88c9a5fc56ac53542b1c37f0

  • SHA1

    dcc094a9af367b01dadc08fa5615fd7f5f3d6ab4

  • SHA256

    b73397f4ecc0468df905734983b35a2a72b9082b941a0dcaa4f8bf530a0690a6

  • SHA512

    72f69bcf4661ee7c13c71354b21dfb93beb7dc43b6aab20cee91a252eb09f23711f463cc49509766bea612cc3adcedd0c09fbde811df62bcd1f07bbc9c94e115

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkFfkeMlN675EgEPgspmBirT/mHWDVQ:Lz071uv4BPMkFfdg6NsIiGuQ

Malware Config

Targets

    • Target

      b73397f4ecc0468df905734983b35a2a72b9082b941a0dcaa4f8bf530a0690a6_NeikiAnalytics.exe

    • Size

      1.6MB

    • MD5

      4bab06dc88c9a5fc56ac53542b1c37f0

    • SHA1

      dcc094a9af367b01dadc08fa5615fd7f5f3d6ab4

    • SHA256

      b73397f4ecc0468df905734983b35a2a72b9082b941a0dcaa4f8bf530a0690a6

    • SHA512

      72f69bcf4661ee7c13c71354b21dfb93beb7dc43b6aab20cee91a252eb09f23711f463cc49509766bea612cc3adcedd0c09fbde811df62bcd1f07bbc9c94e115

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkFfkeMlN675EgEPgspmBirT/mHWDVQ:Lz071uv4BPMkFfdg6NsIiGuQ

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks