Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 09:11
Behavioral task
behavioral1
Sample
b2875e86cf0b296e0ca9d9db04b856b0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b2875e86cf0b296e0ca9d9db04b856b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b2875e86cf0b296e0ca9d9db04b856b0_NeikiAnalytics.exe
-
Size
72KB
-
MD5
b2875e86cf0b296e0ca9d9db04b856b0
-
SHA1
7023b72e483b4cf0d9af4f5a862120e300f580bc
-
SHA256
35bc17f5b11cec574750aa9ce17ca8042168242b1413fc5da7fd375db5f28fae
-
SHA512
fc82a97c9a79dd4c528a1f38ca4b688baacc112b778490d0ec473d7e6ee625eed074dc5dba873cf3cfe5413613c0dd244b2603c9a9230f58e5f43b0edf73ef7d
-
SSDEEP
1536:Irp5QqIiTtVOPyBc+h8JFe7YXlv1IbPFnS7Mb+KR0Nc8QsJq39:KC2BVkwgGGvWb9S7e0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
10.0.2.6:444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.