General

  • Target

    ceb5c2ffc36705b4986e74e415ba9a40_NeikiAnalytics

  • Size

    228KB

  • MD5

    ceb5c2ffc36705b4986e74e415ba9a40

  • SHA1

    ec44ac99174fb62c269a25d63b756c31f0f894d2

  • SHA256

    e1af94e8856d3d509a6d53cced1d97c3951a7529e34ab1079fe36b1be2081b82

  • SHA512

    0a54894c5d1c4ae1ae99028cbadf120e774bbe80c5162fb4dd0b2e890ba38982bf06a59983a66040b6b581fc9e8344ddb26e29d14f3a57e17c6722661405a993

  • SSDEEP

    6144:p1vnayOP3G310Y1wFgXDSiNwdPXjURa2c7YA9IqIOrOd:PDOWl7tWfpXjURa57VHIOG

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • ceb5c2ffc36705b4986e74e415ba9a40_NeikiAnalytics
    .pdf