General

  • Target

    8389d8feea421cfb727c0b7116753e30_NeikiAnalytics

  • Size

    9KB

  • Sample

    240516-c7tfjaha72

  • MD5

    8389d8feea421cfb727c0b7116753e30

  • SHA1

    7716a2a9ec8aba35117bb552f30a7ae93fb315fa

  • SHA256

    a33551fbd9fedef84b5498a7dcf7694a7901f5bc3248321af8ad43be86ddeb24

  • SHA512

    65de43b44fc34f5947e1ec1e17b141ea09070ff157f4fbcd8cbd68335a5ef3529b397cd6f1e22c247cbafa69b09ccfa07a0a02dafa1ecaa8540e224ae5d731e5

  • SSDEEP

    192:GSEZcwOQTHDWJrjjOtI7E5pz6fMTBJZtQ:iZlTKJrjjr7a4

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.6:4444

Targets

    • Target

      8389d8feea421cfb727c0b7116753e30_NeikiAnalytics

    • Size

      9KB

    • MD5

      8389d8feea421cfb727c0b7116753e30

    • SHA1

      7716a2a9ec8aba35117bb552f30a7ae93fb315fa

    • SHA256

      a33551fbd9fedef84b5498a7dcf7694a7901f5bc3248321af8ad43be86ddeb24

    • SHA512

      65de43b44fc34f5947e1ec1e17b141ea09070ff157f4fbcd8cbd68335a5ef3529b397cd6f1e22c247cbafa69b09ccfa07a0a02dafa1ecaa8540e224ae5d731e5

    • SSDEEP

      192:GSEZcwOQTHDWJrjjOtI7E5pz6fMTBJZtQ:iZlTKJrjjr7a4

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks