Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 08:26
Static task
static1
Behavioral task
behavioral1
Sample
c85922de622417a7ffb3b1343ebcaac0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c85922de622417a7ffb3b1343ebcaac0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c85922de622417a7ffb3b1343ebcaac0_NeikiAnalytics.exe
-
Size
72KB
-
MD5
c85922de622417a7ffb3b1343ebcaac0
-
SHA1
a11184660d190e0b5039bc582365b2afe79e0bda
-
SHA256
e7ce9328e2fbd39ceff18ae565a9fecf6cec9663b329cbfba24f9794b517ec3d
-
SHA512
4127d08e49f1407d3219a46494d1a0a095a00cd730a917559e7bd49ef3342de4a80b0bc3cbeb8a81b6598ed915751d0db13cb7443e18a2ba1cc6af912c864134
-
SSDEEP
1536:Ib8EIL6KDGxujbLNoXv4fO4FG3HU+Mb+KR0Nc8QsJq39:9fDGxq+AfOuGze0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
50.25.7.47:62758
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1396-0-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB