Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 16:46
Behavioral task
behavioral1
Sample
03e0363401d623858b5c5ff7aee14030_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03e0363401d623858b5c5ff7aee14030_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
03e0363401d623858b5c5ff7aee14030_NeikiAnalytics.exe
-
Size
9KB
-
MD5
03e0363401d623858b5c5ff7aee14030
-
SHA1
f7cf922100187fb9f785ca7c8e73030be957e937
-
SHA256
ed6f4a48efe49adeae1e108ed6d955a6cc8057b862a42299b0975aea02469e85
-
SHA512
0c4d01b3c329d71fe169a672394ba1cd3fb00c524c67683532aecbad7637034d9f6d2b1c9a70410f7c4c7006f9b729dca3e8255d53718105fd2d83052589a1fc
-
SSDEEP
192:GSE0cwOQTHDWJrjjOYse7E5pz6fMTBJVctQ:i0lTKJrjjP7ah5
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.1.6:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.