General
-
Target
1cc61a8fcf43f1d040a8bc795db6e970_NEIKI
-
Size
6KB
-
Sample
240507-yvanjsga62
-
MD5
1cc61a8fcf43f1d040a8bc795db6e970
-
SHA1
3f9d39d73e400bd7c8ef9a5186bbca9b4ba89889
-
SHA256
7f740fa56f86fb4497d421b5ed52b1779a834fb4494f6c39978f7b420dbf9182
-
SHA512
c8e65e0ad2a2114b856b59dedc2c5c98811818c6620ec3a4a3948f757412c2b7484d9ad8967aabbada4734c787bd56dd6c6d0c8b497b69a012c50982228a88dd
-
SSDEEP
96:dpJNLceZc8xWMbf0wT3e5mhlGepM5MQS:zJNosc8xWMbFT3eKMQMA
Behavioral task
behavioral1
Sample
1cc61a8fcf43f1d040a8bc795db6e970_NEIKI.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1cc61a8fcf43f1d040a8bc795db6e970_NEIKI.dll
Resource
win10v2004-20240419-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
18.139.9.214:14564
Targets
-
-
Target
1cc61a8fcf43f1d040a8bc795db6e970_NEIKI
-
Size
6KB
-
MD5
1cc61a8fcf43f1d040a8bc795db6e970
-
SHA1
3f9d39d73e400bd7c8ef9a5186bbca9b4ba89889
-
SHA256
7f740fa56f86fb4497d421b5ed52b1779a834fb4494f6c39978f7b420dbf9182
-
SHA512
c8e65e0ad2a2114b856b59dedc2c5c98811818c6620ec3a4a3948f757412c2b7484d9ad8967aabbada4734c787bd56dd6c6d0c8b497b69a012c50982228a88dd
-
SSDEEP
96:dpJNLceZc8xWMbf0wT3e5mhlGepM5MQS:zJNosc8xWMbFT3eKMQMA
Score1/10 -