Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 06:10
Behavioral task
behavioral1
Sample
bcab8e875fb035ec9b1287a76568fd00_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bcab8e875fb035ec9b1287a76568fd00_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
bcab8e875fb035ec9b1287a76568fd00_NeikiAnalytics.exe
-
Size
72KB
-
MD5
bcab8e875fb035ec9b1287a76568fd00
-
SHA1
90ec75ce68b715386339bdc3bd74875d14530f95
-
SHA256
0902bfdbc18823b10c660a705d022e2d64c9b0af8cc6513a0f91ba0f5e507adb
-
SHA512
8103942d185df121cc589a3565ce783c61a5a4c8517aa3c8c6b3136e39d75cdadfcc3b4c19ce9dc1223f75653cc69c333bae64e42113950f52d49ee0dab0e18b
-
SSDEEP
1536:Ia1uiJLCNusp6kra6DisvsEklOP1BnZMb+KR0Nc8QsJq39:XuquNus3pd1BnZe0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1732-0-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB