Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 00:38
Behavioral task
behavioral1
Sample
60dfcfe7f944facaa5555c5669bd3570_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
60dfcfe7f944facaa5555c5669bd3570_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
60dfcfe7f944facaa5555c5669bd3570_NeikiAnalytics.exe
-
Size
72KB
-
MD5
60dfcfe7f944facaa5555c5669bd3570
-
SHA1
3ba300f165f9b8cdb3492b606bd85588564268de
-
SHA256
4bb15803736df2432c588623162ad786a260c3e518c22c147f81755b113313e5
-
SHA512
2f95113253480b2edc41a00fea0703221a1d6f4c147c45689f9219b2c4ad197a769993a8a5ff47f28f97f824f48dc341be910f6d2e175c223e9a03d2216b203b
-
SSDEEP
1536:IeBHeeqGckgolb3TXRsv5LZyWMb+KR0Nc8QsJq39:XBpck17ThspZxe0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.