Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 04:52
Behavioral task
behavioral1
Sample
819040d381f15c0bfa19f93a0d0dd0c0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
819040d381f15c0bfa19f93a0d0dd0c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
819040d381f15c0bfa19f93a0d0dd0c0_NeikiAnalytics.exe
-
Size
32KB
-
MD5
819040d381f15c0bfa19f93a0d0dd0c0
-
SHA1
a7505df9a93c6d44012c151f70a7f113855308ab
-
SHA256
1509e4a795ac045e62ff0d962cb9976d25cb20cb8ef4546c2dca0a5784594a25
-
SHA512
3e07be0a94407c1f8ddcde8e23f2fe94b6668ce4d9ada1c11af105287901cdc2e1095ee0bcd2e75d8f1189ef46b312d6e38ad83f2042982b269513a69c3c447a
-
SSDEEP
768:vOnM+oCnlnzwO7okPqDo3+IQLWVHQ0DDchHJ3kX0D3b:oXoKlnzpMyqDQ+IJDDctJUX0Dr
Malware Config
Extracted
metasploit
metasploit_stager
127.0.0.1:123
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.