General

  • Target

    4c3e6b79cb814ae52228666937fb0e6e5a429e8d3bfefedce860d2eb64f968a7_NeikiAnalytics.exe

  • Size

    1.8MB

  • Sample

    240701-mxsrcszhql

  • MD5

    1ce2a9d449ae69edbd7bc0240a91b020

  • SHA1

    4e53263a499a56eeaedd2cff1f360cb6d4a78c74

  • SHA256

    4c3e6b79cb814ae52228666937fb0e6e5a429e8d3bfefedce860d2eb64f968a7

  • SHA512

    89eed9e65b1a013f68f45e56c47bb28a52cd57ec488c595a91b38fa92e135739a6a71b9e3dbae1dcf253b55d88d4b555d3ccac448b258a967d9f05664bbdc795

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkUCCWvLEvjFkTVnfuDPFFWqreoYtgWqabE1y14dMPV:Lz071uv4BPMkHC0IEFTo/abRcN91y

Malware Config

Targets

    • Target

      4c3e6b79cb814ae52228666937fb0e6e5a429e8d3bfefedce860d2eb64f968a7_NeikiAnalytics.exe

    • Size

      1.8MB

    • MD5

      1ce2a9d449ae69edbd7bc0240a91b020

    • SHA1

      4e53263a499a56eeaedd2cff1f360cb6d4a78c74

    • SHA256

      4c3e6b79cb814ae52228666937fb0e6e5a429e8d3bfefedce860d2eb64f968a7

    • SHA512

      89eed9e65b1a013f68f45e56c47bb28a52cd57ec488c595a91b38fa92e135739a6a71b9e3dbae1dcf253b55d88d4b555d3ccac448b258a967d9f05664bbdc795

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkUCCWvLEvjFkTVnfuDPFFWqreoYtgWqabE1y14dMPV:Lz071uv4BPMkHC0IEFTo/abRcN91y

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks