General
-
Target
ddbabe04c42d6bb82375a3e4c382d6e0_NeikiAnalytics
-
Size
72KB
-
Sample
240516-n799tsca97
-
MD5
ddbabe04c42d6bb82375a3e4c382d6e0
-
SHA1
928f425c52057ffcd8d3370aed9765ae9651782a
-
SHA256
28dd5cb3b693dfd16877f0a564b4e6e4a804966fb6a135ec6b7dd933267651e0
-
SHA512
ebe0e99c7ee1aafd772f527face2612d21bea9e50c32ab78b8a3cbb5ecb9eb324e0ae7d8df392071596c2f1387616b0f655748239ea7c9be652e3b4cb243257a
-
SSDEEP
1536:InMyPENz4P7O2VR3JkDVoGiaB+cu8kA5Mb+KR0Nc8QsJq39:BXNz4Pi2VaVo6+o5e0Nc8QsC9
Behavioral task
behavioral1
Sample
ddbabe04c42d6bb82375a3e4c382d6e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ddbabe04c42d6bb82375a3e4c382d6e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
188.242.176.217:50933
Targets
-
-
Target
ddbabe04c42d6bb82375a3e4c382d6e0_NeikiAnalytics
-
Size
72KB
-
MD5
ddbabe04c42d6bb82375a3e4c382d6e0
-
SHA1
928f425c52057ffcd8d3370aed9765ae9651782a
-
SHA256
28dd5cb3b693dfd16877f0a564b4e6e4a804966fb6a135ec6b7dd933267651e0
-
SHA512
ebe0e99c7ee1aafd772f527face2612d21bea9e50c32ab78b8a3cbb5ecb9eb324e0ae7d8df392071596c2f1387616b0f655748239ea7c9be652e3b4cb243257a
-
SSDEEP
1536:InMyPENz4P7O2VR3JkDVoGiaB+cu8kA5Mb+KR0Nc8QsJq39:BXNz4Pi2VaVo6+o5e0Nc8QsC9
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-