General

  • Target

    39fb045f6ea2a7398c55a3c1c9b230a5fb2a925735dceb5b887504e587c664f4_NeikiAnalytics.exe

  • Size

    1.9MB

  • Sample

    240701-gj9j3a1crr

  • MD5

    add1afc67903e7b5e9a1eae3126bd180

  • SHA1

    28eae62ca982656c18c7cf8ceff4b3c37420e30b

  • SHA256

    39fb045f6ea2a7398c55a3c1c9b230a5fb2a925735dceb5b887504e587c664f4

  • SHA512

    76ff57205f38ef5dfe6f0fa70b970646eea93df94fe3300177d4e7c2f50a54a063a0510e7707c970031a6328ea6387978f1f840cdb78cff484d3b4a8ddb9bc1f

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkFfkeMlN675EgEPgsU5qTqOk0t2MPnt4Jh/eFVHf+M:Lz071uv4BPMkFfdg6NsTt2MPTHfbhZ

Malware Config

Targets

    • Target

      39fb045f6ea2a7398c55a3c1c9b230a5fb2a925735dceb5b887504e587c664f4_NeikiAnalytics.exe

    • Size

      1.9MB

    • MD5

      add1afc67903e7b5e9a1eae3126bd180

    • SHA1

      28eae62ca982656c18c7cf8ceff4b3c37420e30b

    • SHA256

      39fb045f6ea2a7398c55a3c1c9b230a5fb2a925735dceb5b887504e587c664f4

    • SHA512

      76ff57205f38ef5dfe6f0fa70b970646eea93df94fe3300177d4e7c2f50a54a063a0510e7707c970031a6328ea6387978f1f840cdb78cff484d3b4a8ddb9bc1f

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkFfkeMlN675EgEPgsU5qTqOk0t2MPnt4Jh/eFVHf+M:Lz071uv4BPMkFfdg6NsTt2MPTHfbhZ

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks