General

  • Target

    242b9a926d0bfb91c12ad5a9b0bce830_NeikiAnalytics.pdf

  • Size

    407KB

  • MD5

    242b9a926d0bfb91c12ad5a9b0bce830

  • SHA1

    24e607acbbdc85358275ed1a2286478527a23e24

  • SHA256

    f84278c113bc1a548cd3062a0e8691b7c4c6f8cda96f0cfd2464432b3f3dd872

  • SHA512

    20450084ebd474ad00df6b6b19fd137b6b1a8347de7ff0f6860e3d6152b2d06adf2539c1bb8d3bdd0fa33b81c98623d1b3456a351d69b12421e8693be12d14e8

  • SSDEEP

    6144:7IAYe1jPXEJGb4349P10J84Pt9gRI5GUvPcaYWPohpL5zbGegp:1Ye1jPBb4AP1EiRI4Uv0aYWPOp8

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • 242b9a926d0bfb91c12ad5a9b0bce830_NeikiAnalytics.pdf
    .pdf