General

  • Target

    427ef181839786c198c5e39730d9f610_NeikiAnalytics

  • Size

    72KB

  • Sample

    240514-aypd4sca3z

  • MD5

    427ef181839786c198c5e39730d9f610

  • SHA1

    088bb6ef7058e692f5a4171fd0ae40f91fc42ab9

  • SHA256

    84b8bf6e57b1bc62e2bbe1c67d5a162547ee34c27a949ed64023d06d937b6edf

  • SHA512

    7bb7c758799e27524c35cbb6541a3d4f62502a28787f70621052bc38b6637749e8407db50097c7f4b32fb48384770844729edca6b294e03c9f6cac7af0f44caa

  • SSDEEP

    1536:ITphfX3UFUUnCZkQgPzwfR2PvEBW6OeMvXPM6SMb+KR0Nc8QsJq39:O0ZnwgsfRuvEY6OTvEJe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.204.131:9090

Targets

    • Target

      427ef181839786c198c5e39730d9f610_NeikiAnalytics

    • Size

      72KB

    • MD5

      427ef181839786c198c5e39730d9f610

    • SHA1

      088bb6ef7058e692f5a4171fd0ae40f91fc42ab9

    • SHA256

      84b8bf6e57b1bc62e2bbe1c67d5a162547ee34c27a949ed64023d06d937b6edf

    • SHA512

      7bb7c758799e27524c35cbb6541a3d4f62502a28787f70621052bc38b6637749e8407db50097c7f4b32fb48384770844729edca6b294e03c9f6cac7af0f44caa

    • SSDEEP

      1536:ITphfX3UFUUnCZkQgPzwfR2PvEBW6OeMvXPM6SMb+KR0Nc8QsJq39:O0ZnwgsfRuvEY6OTvEJe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks