Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 23:02
Behavioral task
behavioral1
Sample
1c01b684fd7a9b216d615248bae8ddd0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c01b684fd7a9b216d615248bae8ddd0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1c01b684fd7a9b216d615248bae8ddd0_NeikiAnalytics.exe
-
Size
72KB
-
MD5
1c01b684fd7a9b216d615248bae8ddd0
-
SHA1
980b99d39cc6aefc7c1a67a6d34b53c03f494f0e
-
SHA256
8c697782e0c2996442292b50412496ded30fe59abcbcb22d8164af06e6b11e53
-
SHA512
f1bd5aeb3a369e898b7b8de0c5517ceb7e3b384d032de39f9d7943e474ab19838039421e51cfd9b2dfee4c6b2dbf19129049728c26e939f2b181c44b8b0ec654
-
SSDEEP
1536:Iw7adnPcNsJl2gCi/AYrcqcLEPIXkpViaWldeMb+KR0Nc8QsJq39:HaVUNsJSiIH3QP9KaMee0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.1.3:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.