General

  • Target

    4134afb1740107b5a480bf01461cb24d32e4032426b1a213ec480b5abb5eb51e_NeikiAnalytics.exe

  • Size

    1.8MB

  • Sample

    240701-jqsagazelh

  • MD5

    901d82cb95bc841c03a58e3ee890be50

  • SHA1

    ca61f37cd2d7b2585fe04a39ff5a7df244abee9f

  • SHA256

    4134afb1740107b5a480bf01461cb24d32e4032426b1a213ec480b5abb5eb51e

  • SHA512

    16a83ba2140a43da94b66b82246a93289fc3e6e51a2334afecd8e0d1b1698327c1888efe1203d0c9db079e3a31b96d2e5eb062913bdfb642531b47db4d7c6e90

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkipfzaCtNcQcAupaXHeY5HmsoKTQXvaW9Rcps9kdiq:Lz071uv4BPMki8CnfLv3zQXtTE3h

Malware Config

Targets

    • Target

      4134afb1740107b5a480bf01461cb24d32e4032426b1a213ec480b5abb5eb51e_NeikiAnalytics.exe

    • Size

      1.8MB

    • MD5

      901d82cb95bc841c03a58e3ee890be50

    • SHA1

      ca61f37cd2d7b2585fe04a39ff5a7df244abee9f

    • SHA256

      4134afb1740107b5a480bf01461cb24d32e4032426b1a213ec480b5abb5eb51e

    • SHA512

      16a83ba2140a43da94b66b82246a93289fc3e6e51a2334afecd8e0d1b1698327c1888efe1203d0c9db079e3a31b96d2e5eb062913bdfb642531b47db4d7c6e90

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkipfzaCtNcQcAupaXHeY5HmsoKTQXvaW9Rcps9kdiq:Lz071uv4BPMki8CnfLv3zQXtTE3h

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks