Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 06:46
Behavioral task
behavioral1
Sample
94e462ee043d0dd5436fdc9a4b8beb00_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94e462ee043d0dd5436fdc9a4b8beb00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
94e462ee043d0dd5436fdc9a4b8beb00_NeikiAnalytics.exe
-
Size
72KB
-
MD5
94e462ee043d0dd5436fdc9a4b8beb00
-
SHA1
3d572091603e6d023a4c1a594a4b2c2495ae681e
-
SHA256
c2b5ddf45149ceaa8a0581d42944379227d5bab41ef4247177b2900d0da8a9b3
-
SHA512
00e4795d22f453b28900a51e57213d1203f1ef05ab46526a592c492e97fba4e641c263d2d9a594cc63288e181b608f30baf53382af939ca12d9a034445fe0786
-
SSDEEP
1536:I3XbTA3Ra7TvJpGl8/nbJmFymRRKN5/VMb+KR0Nc8QsJq39:0bTABaJlDJmgJe0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.