General

  • Target

    46a6bb202cd4293fe572c71cbef4064cfda0d6036c5729d0e1eb1038a1d4b4e5_NeikiAnalytics.exe

  • Size

    1.4MB

  • Sample

    240701-la2kbatcjd

  • MD5

    5cce715d27745e41a3af3bfefc1ec990

  • SHA1

    6cb0a7d933d81e20030eb2f7a3c25d4e3862a009

  • SHA256

    46a6bb202cd4293fe572c71cbef4064cfda0d6036c5729d0e1eb1038a1d4b4e5

  • SHA512

    13effd0321093b0252d6926e8cfb54c98b664a3e5f3b8cf8ad9fede02bccc76f4615b45b6b3ee10ed6e3cae275b4bcff75cf26ccdf0a5b60486dba85ae13dd5e

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Q1szp5NnNvZrV5GgCzxcMf87muR+TNb:Lz071uv4BPMkyW10/w16BWgac280N

Malware Config

Targets

    • Target

      46a6bb202cd4293fe572c71cbef4064cfda0d6036c5729d0e1eb1038a1d4b4e5_NeikiAnalytics.exe

    • Size

      1.4MB

    • MD5

      5cce715d27745e41a3af3bfefc1ec990

    • SHA1

      6cb0a7d933d81e20030eb2f7a3c25d4e3862a009

    • SHA256

      46a6bb202cd4293fe572c71cbef4064cfda0d6036c5729d0e1eb1038a1d4b4e5

    • SHA512

      13effd0321093b0252d6926e8cfb54c98b664a3e5f3b8cf8ad9fede02bccc76f4615b45b6b3ee10ed6e3cae275b4bcff75cf26ccdf0a5b60486dba85ae13dd5e

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Q1szp5NnNvZrV5GgCzxcMf87muR+TNb:Lz071uv4BPMkyW10/w16BWgac280N

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks