General

  • Target

    b2875e86cf0b296e0ca9d9db04b856b0_NeikiAnalytics

  • Size

    72KB

  • Sample

    240510-k54sgsed2z

  • MD5

    b2875e86cf0b296e0ca9d9db04b856b0

  • SHA1

    7023b72e483b4cf0d9af4f5a862120e300f580bc

  • SHA256

    35bc17f5b11cec574750aa9ce17ca8042168242b1413fc5da7fd375db5f28fae

  • SHA512

    fc82a97c9a79dd4c528a1f38ca4b688baacc112b778490d0ec473d7e6ee625eed074dc5dba873cf3cfe5413613c0dd244b2603c9a9230f58e5f43b0edf73ef7d

  • SSDEEP

    1536:Irp5QqIiTtVOPyBc+h8JFe7YXlv1IbPFnS7Mb+KR0Nc8QsJq39:KC2BVkwgGGvWb9S7e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.0.2.6:444

Targets

    • Target

      b2875e86cf0b296e0ca9d9db04b856b0_NeikiAnalytics

    • Size

      72KB

    • MD5

      b2875e86cf0b296e0ca9d9db04b856b0

    • SHA1

      7023b72e483b4cf0d9af4f5a862120e300f580bc

    • SHA256

      35bc17f5b11cec574750aa9ce17ca8042168242b1413fc5da7fd375db5f28fae

    • SHA512

      fc82a97c9a79dd4c528a1f38ca4b688baacc112b778490d0ec473d7e6ee625eed074dc5dba873cf3cfe5413613c0dd244b2603c9a9230f58e5f43b0edf73ef7d

    • SSDEEP

      1536:Irp5QqIiTtVOPyBc+h8JFe7YXlv1IbPFnS7Mb+KR0Nc8QsJq39:KC2BVkwgGGvWb9S7e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks