Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 18:44
Behavioral task
behavioral1
Sample
1241510362d056c4e1ecbcb37bc30770_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1241510362d056c4e1ecbcb37bc30770_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
1241510362d056c4e1ecbcb37bc30770_NeikiAnalytics.exe
-
Size
72KB
-
MD5
1241510362d056c4e1ecbcb37bc30770
-
SHA1
c94f7699e962877c0cc832d2ba3485d9063b2eaa
-
SHA256
f29b3a285e65a532ece38f5ca164355d2493debfe201b3a9e29a4c348cf3b0e2
-
SHA512
e0a9e1c9bc2879454b3c260afa62427b0411b9e7f8c0c485e0f1ed9098039f85eb13fc14c16cea986cbf56eababe4d6fe088d307065ab50d58ca504dfc89c2a4
-
SSDEEP
1536:IYizxjtMPJtYQqvrT3mXEQ7iy6DU+EUHE5uuMb+KR0Nc8QsJq39:jaJgJzqW0Q7iy6w+ue0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.56.104:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1936-0-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB