General

  • Target

    2c96f4ad3eb9970acfe5d378f0e97d20_NeikiAnalytics

  • Size

    463KB

  • MD5

    2c96f4ad3eb9970acfe5d378f0e97d20

  • SHA1

    b26a7c032e85b81806b1339345599327d128e706

  • SHA256

    a2a2ecaf867da36fe24240501660b511b6b2c3dc9456112d84913408271ebf5e

  • SHA512

    7079bb3a41cc9e4ab117e596210351116fc46e9862a5bc0bba7a11359f5d07a1d391736ac9ba51191399d11f1c1f87b1afb16f130dd957c853bb7a76d4fa3f76

  • SSDEEP

    12288:zhQRcdYbfDvOPxKCj7hM9MwvRmM60zUe7Cl1wiXF:OeMLuxKwlyRmML7oSi1

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • 2c96f4ad3eb9970acfe5d378f0e97d20_NeikiAnalytics
    .pdf