General

  • Target

    5dea6567af12a597af9f8df4a2c7d230_NeikiAnalytics

  • Size

    441KB

  • MD5

    5dea6567af12a597af9f8df4a2c7d230

  • SHA1

    4551c64fefa457c36cb8372593045e16ae2b0125

  • SHA256

    e3db27c978eb3885d848d70b5618bd234387434bdf150a5105a602fbcb4f39a0

  • SHA512

    f966cf2495484df1d9001228caa0ad0539443c5a6bf45f6cc48c71f24d3643a09eee0da004528d555361fcd7088aa6dbd7d165a60f84e889d217f940afeaf68b

  • SSDEEP

    12288:PWUqxYMv7a+f4eb2fUU7jcueRQXiDMj10swFZ8LLHtyGo:u+2WC4lXjVk4B4Fe3U

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • 5dea6567af12a597af9f8df4a2c7d230_NeikiAnalytics
    .pdf