General

  • Target

    4b3015bdfeb3e02a86169d9028e4f880_NEIKI

  • Size

    396KB

  • MD5

    4b3015bdfeb3e02a86169d9028e4f880

  • SHA1

    3fb14136b181e0bc4a32f4f5bd3344d70e4d5ddf

  • SHA256

    ad2c5c7009ff0ba4871f72455026102f22d93c7737f1f1a34863393394814ed8

  • SHA512

    65e4ae4d43008dc7288c89d7088f03becda8c6e0d1eb893faac606865866d2c86fddf8753190904ccf1b2ab50f859c51170e28bf6b13a470cfabf36d5afd5e35

  • SSDEEP

    12288:ndkprQkraSWh+rc7eY10OxvSwHmO9BtQw3veCwqhK+J:deTrJbACEzxr9BGwf4qw+J

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • 4b3015bdfeb3e02a86169d9028e4f880_NEIKI
    .pdf