Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 20:08
Behavioral task
behavioral1
Sample
64f3e8fc6c22078be72727cbe0c60050_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
64f3e8fc6c22078be72727cbe0c60050_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
64f3e8fc6c22078be72727cbe0c60050_NeikiAnalytics.exe
-
Size
72KB
-
MD5
64f3e8fc6c22078be72727cbe0c60050
-
SHA1
a28ade8adfeb04f0de51c31ddc5589234df1d526
-
SHA256
a7606d15c0c35a532a08de8df59186ac9cdd99bcd4aaa527484e6feec01e771d
-
SHA512
888b309b5c8dd17a012e6dc46c027e1229a62da2b4bdf610e7ca63c4d271daf8e6648ce14fecadc9b6fcc31af9593a187f2176b012a900c31892fc24ed1ebb7b
-
SSDEEP
1536:IqXv4uD1sD8MGxY+V/zXTMTCEcm1nMb+KR0Nc8QsJq39:5Xv4iAuYM/zXwTR7ne0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.