General

  • Target

    9fb5f15b04cb8389481a350d448bb650_NeikiAnalytics

  • Size

    4.8MB

  • MD5

    9fb5f15b04cb8389481a350d448bb650

  • SHA1

    d0d8a2b8a299b3f31f48d95b04dbe507805d79d0

  • SHA256

    9522852e533f5f2a90811fa8dc3c4de7d19dd0b4877ed7bac01ff67bf50f5d51

  • SHA512

    940726942057045ea9519b60e3dacbd3703d61607c5f2637f531a812f04ad12f922fee9f892981c97100824eec86aad304f77747deaa6ad1c5c181c13bedc9b4

  • SSDEEP

    49152:FdK84S4AOqB49UVKi+VeIB8+ffb8wK932QlOTaF6eBwHAzWzuORFi8wvuQysv1ha:fTOqW6Qr8wPdTDeCHASwosm/

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • 9fb5f15b04cb8389481a350d448bb650_NeikiAnalytics
    .pdf
    • http://device.zip

    • http://ysoserial.net

    • https://censys.io/

    • https://claroty.com/2020/04/27/critical-infrastructure-attack-attempted-against-israeli-water-supply/

    • https://claroty.com/2020/11/10/blog-research-schneider-m221-plcs/

    • https://claroty.com/2021/03/23/blog-research-vulnerabilities-in-tbox-rtus/

    • https://claroty.com/team82/blog/critical-authentication-bypass-in-rockwell-software

    • https://claroty.com/team82/blog/from-project-file-to-code-execution-exploiting-vulnerabilities-in-xinje-plc-program-tool

    • https://conferences.computer.org/sp/pdfs/spw/2021/893400a383.pdf

    • Show all