General

  • Target

    1cc61a8fcf43f1d040a8bc795db6e970_NEIKI

  • Size

    6KB

  • MD5

    1cc61a8fcf43f1d040a8bc795db6e970

  • SHA1

    3f9d39d73e400bd7c8ef9a5186bbca9b4ba89889

  • SHA256

    7f740fa56f86fb4497d421b5ed52b1779a834fb4494f6c39978f7b420dbf9182

  • SHA512

    c8e65e0ad2a2114b856b59dedc2c5c98811818c6620ec3a4a3948f757412c2b7484d9ad8967aabbada4734c787bd56dd6c6d0c8b497b69a012c50982228a88dd

  • SSDEEP

    96:dpJNLceZc8xWMbf0wT3e5mhlGepM5MQS:zJNosc8xWMbFT3eKMQMA

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

18.139.9.214:14564

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1cc61a8fcf43f1d040a8bc795db6e970_NEIKI
    .dll windows:4 windows x86 arch:x86

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections