Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 12:03
Behavioral task
behavioral1
Sample
ddbabe04c42d6bb82375a3e4c382d6e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ddbabe04c42d6bb82375a3e4c382d6e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ddbabe04c42d6bb82375a3e4c382d6e0_NeikiAnalytics.exe
-
Size
72KB
-
MD5
ddbabe04c42d6bb82375a3e4c382d6e0
-
SHA1
928f425c52057ffcd8d3370aed9765ae9651782a
-
SHA256
28dd5cb3b693dfd16877f0a564b4e6e4a804966fb6a135ec6b7dd933267651e0
-
SHA512
ebe0e99c7ee1aafd772f527face2612d21bea9e50c32ab78b8a3cbb5ecb9eb324e0ae7d8df392071596c2f1387616b0f655748239ea7c9be652e3b4cb243257a
-
SSDEEP
1536:InMyPENz4P7O2VR3JkDVoGiaB+cu8kA5Mb+KR0Nc8QsJq39:BXNz4Pi2VaVo6+o5e0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
188.242.176.217:50933
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4820-0-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB