General

  • Target

    2bbdd391ca2fdd3a2e631c74b3ed9c90_NeikiAnalytics

  • Size

    242KB

  • MD5

    2bbdd391ca2fdd3a2e631c74b3ed9c90

  • SHA1

    b68910091b01d6a4e7e06aa80cb57e08776e9c44

  • SHA256

    cc8f9896b76a048b7a79a987e51217c91b374d7dd28fb42371edeca776b95ba9

  • SHA512

    f28178897c8a8be8cce55ae16a092e1352f75206373da2718fdbb2ed89a9fb5ae4f26f5bf5502009a23084de59b1bad830c8b8d766d8338b5200eb9a5eb2500e

  • SSDEEP

    6144:rFl+8IA0bU6A6bBWc6Bofa2yt4Z7eoRNn/7oYL:xllIA0bU6DUXBofaEVRNn/

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • 2bbdd391ca2fdd3a2e631c74b3ed9c90_NeikiAnalytics
    .pdf