General

  • Target

    1c9709cffd44531fe3f7c50f2c9d02e0_NeikiAnalytics

  • Size

    72KB

  • Sample

    240514-yyhtbseg84

  • MD5

    1c9709cffd44531fe3f7c50f2c9d02e0

  • SHA1

    1bb842567f9875bb3183c6fb3db7e3b86e8e2f80

  • SHA256

    6d33425619bb1288bbfc91cafac60d633f239df5c3b897b4a705265fc417eff8

  • SHA512

    037f1dd870e5130d8a03ec6640cacba963aeec2b88a00845ea412350b7e73d6afd9b4613fabb2579796c89ddfb0279c8c6011457d8d1470dcab5bb70c514c6f9

  • SSDEEP

    1536:IGAX+uK8btNURaElofRHqqFeh/HpR/N0211Mb+KR0Nc8QsJq39:HozKFaEQRKTH//6211e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.0.0.14:4444

Targets

    • Target

      1c9709cffd44531fe3f7c50f2c9d02e0_NeikiAnalytics

    • Size

      72KB

    • MD5

      1c9709cffd44531fe3f7c50f2c9d02e0

    • SHA1

      1bb842567f9875bb3183c6fb3db7e3b86e8e2f80

    • SHA256

      6d33425619bb1288bbfc91cafac60d633f239df5c3b897b4a705265fc417eff8

    • SHA512

      037f1dd870e5130d8a03ec6640cacba963aeec2b88a00845ea412350b7e73d6afd9b4613fabb2579796c89ddfb0279c8c6011457d8d1470dcab5bb70c514c6f9

    • SSDEEP

      1536:IGAX+uK8btNURaElofRHqqFeh/HpR/N0211Mb+KR0Nc8QsJq39:HozKFaEQRKTH//6211e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks