General

  • Target

    371d265aacf45cbc368f275600d0378bb57c0910115dbd7bcec0d3ab8f73eb31_NeikiAnalytics.exe

  • Size

    5.3MB

  • Sample

    240701-fmapgazfql

  • MD5

    710d82b7bd49afd6ee109fb4dd252db0

  • SHA1

    f6c82e6b5d59e0724d1f6bcc63774d7103acaaa6

  • SHA256

    371d265aacf45cbc368f275600d0378bb57c0910115dbd7bcec0d3ab8f73eb31

  • SHA512

    5eefb84f4cc3bb3ee416cdc2b8660ea53f591b0646c4208f67d01f390201ad3fb4ffcad8eff3bee5ea7f5ece042bf01db11b2247129e5f5cae21d5702a3f33d3

  • SSDEEP

    98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S

Malware Config

Targets

    • Target

      371d265aacf45cbc368f275600d0378bb57c0910115dbd7bcec0d3ab8f73eb31_NeikiAnalytics.exe

    • Size

      5.3MB

    • MD5

      710d82b7bd49afd6ee109fb4dd252db0

    • SHA1

      f6c82e6b5d59e0724d1f6bcc63774d7103acaaa6

    • SHA256

      371d265aacf45cbc368f275600d0378bb57c0910115dbd7bcec0d3ab8f73eb31

    • SHA512

      5eefb84f4cc3bb3ee416cdc2b8660ea53f591b0646c4208f67d01f390201ad3fb4ffcad8eff3bee5ea7f5ece042bf01db11b2247129e5f5cae21d5702a3f33d3

    • SSDEEP

      98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks