Analysis
-
max time kernel
1375s -
max time network
1163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 18:20
Behavioral task
behavioral1
Sample
1ac384bf58e088348dd14accfe698320_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1ac384bf58e088348dd14accfe698320_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1ac384bf58e088348dd14accfe698320_NeikiAnalytics.exe
-
Size
2.2MB
-
MD5
1ac384bf58e088348dd14accfe698320
-
SHA1
603868937d15d8ea97942db55d6f38803c1c89a3
-
SHA256
742df8605b2f233354aef3862085ed2caad71766bf5db8bc5f79dc274fd66a19
-
SHA512
1acfd11eb95b8b598e45b70232bf6713e4faa24ca00fc18615a73b6c0fe20fd361efba951f9de18bb4b18be1180e4f5aeefe754fb58cc13ed79808a947907342
-
SSDEEP
24576:XpJQ3tQ4jNWweGRlTJcx2hekmUMg2IpeqUGkQxHuyuViNJE6x+rKnibiF1M:XpYRpWweA9Q2MW2IpkGFxpMqB+WF1M
Malware Config
Extracted
metasploit
windows/reverse_ipv6_tcp
[fe80::5efe:7f00:1]:123
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.