General

  • Target

    66b8d87fdeedea3fdfa88af3c86e40c0_NeikiAnalytics

  • Size

    355KB

  • MD5

    66b8d87fdeedea3fdfa88af3c86e40c0

  • SHA1

    e7b0c4114fb5a414c8ad131f82ab78636f9bf836

  • SHA256

    1530d0c22fa8ddee4e98486db77751c67425bdf66804aa67b222aab641e4bc92

  • SHA512

    e212fc4bed47b858ace2a4a53e17e239860bd1c9cd318d6e603915544ea608308a7ae6f67c312c43ace6f5d597af0401b51caebe39f84bc8b45955f099ebad17

  • SSDEEP

    6144:pGDMHaDjObpjj2MANYa/zvTQj8mTgR7dZrRRER6oTjjfITO:p16Dj8pmJzC8OWHu6ojWO

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • 66b8d87fdeedea3fdfa88af3c86e40c0_NeikiAnalytics
    .pdf