Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 13:45
Behavioral task
behavioral1
Sample
17999791b5937bbf0f3decca251ac9a0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
17999791b5937bbf0f3decca251ac9a0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
17999791b5937bbf0f3decca251ac9a0_NeikiAnalytics.exe
-
Size
72KB
-
MD5
17999791b5937bbf0f3decca251ac9a0
-
SHA1
906585cb8dc4b748a7764e14dd250c2a590ac97d
-
SHA256
0ee2f84ae63abb06abe81c4b4c9beebcdd64d81fd4f501ff98f46fe257b38b3f
-
SHA512
87ee2fe6326b1e899dd24888394991b70b53293acb19db6b4bf572a9b943fd1d594ef334f065921fbf1ca4df73300176dbd7435d72b199386a1b3cec26f1c2cb
-
SSDEEP
1536:IUZPOcxbNQmkjnat84KMb+KR0Nc8QsJq39:LPRLQmkjnatAe0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.