Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 23:40
Behavioral task
behavioral1
Sample
21f4dc4f0f2250cee21d7ba24260eed0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
21f4dc4f0f2250cee21d7ba24260eed0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
21f4dc4f0f2250cee21d7ba24260eed0_NeikiAnalytics.exe
-
Size
72KB
-
MD5
21f4dc4f0f2250cee21d7ba24260eed0
-
SHA1
d1805f3840c68121436bd65f6270c2744e790743
-
SHA256
dc47d4195b2099e3bb8314e299c64ffbfed80a4ed1f247e52c490e028109213e
-
SHA512
4194cae8e5f4c4124672d8fc3b8754e88eebf1244eafd68d3311c9139aa456f9dc5cb7d552607504b3c62ddf075a3b71859a489911ad9e4cd439e27bb7d1b76d
-
SSDEEP
1536:IXYFDjZlsUhRUmTNTwF4LfSSUdh9hMb+KR0Nc8QsJq39:SYF3hMkTw/SUZhe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.2.1:8888
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.