General

  • Target

    ccf670c79f6b7d130f7d0507664e5af0_NeikiAnalytics

  • Size

    72KB

  • Sample

    240510-m7hn5seb68

  • MD5

    ccf670c79f6b7d130f7d0507664e5af0

  • SHA1

    3e4ddf874f724c993efad0f6e00b600c738c7681

  • SHA256

    f81901ccae10a9236a9179fa6f8111ca11941ceca4a92400af97e51c646eb90e

  • SHA512

    4cc517673aed59246c025b153680d674cd48fa1a2d02116aff9355d2f2925339fd31846417ce9639151c310e7adf940eb68cc35dea43c12eb14b3aeab102ffbf

  • SSDEEP

    1536:IaaQNQvFJvJv0cUzO618DZlyPG7oFlbQLe7VuS3AFHWMb+KR0Nc8QsJq39:DXNQ9ZdYONZwe7oFl8CLRe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.15.215:444

Targets

    • Target

      ccf670c79f6b7d130f7d0507664e5af0_NeikiAnalytics

    • Size

      72KB

    • MD5

      ccf670c79f6b7d130f7d0507664e5af0

    • SHA1

      3e4ddf874f724c993efad0f6e00b600c738c7681

    • SHA256

      f81901ccae10a9236a9179fa6f8111ca11941ceca4a92400af97e51c646eb90e

    • SHA512

      4cc517673aed59246c025b153680d674cd48fa1a2d02116aff9355d2f2925339fd31846417ce9639151c310e7adf940eb68cc35dea43c12eb14b3aeab102ffbf

    • SSDEEP

      1536:IaaQNQvFJvJv0cUzO618DZlyPG7oFlbQLe7VuS3AFHWMb+KR0Nc8QsJq39:DXNQ9ZdYONZwe7oFl8CLRe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks