General

  • Target

    2d83d0c300fe635c27864bec49cc6a4c8890ef844a6eedc00c7e2dba6482d694_NeikiAnalytics

  • Size

    72KB

  • Sample

    240521-lkxdcagf5z

  • MD5

    9ad35eebbc613ed72c7b51cace257dc0

  • SHA1

    f71aae0ebc61c4798245b53e8c918b08723d0efa

  • SHA256

    2d83d0c300fe635c27864bec49cc6a4c8890ef844a6eedc00c7e2dba6482d694

  • SHA512

    5b2015a063f73667589dbf160dab388b1a554b9a3320aaba5fb25c8a5a44e9353d56e19e8cf148da72b494f38dab55a4e37d91ddabde1637c9231069820f5b5d

  • SSDEEP

    1536:IcRp4egJihl116uZAIkPMiE6Mb+KR0Nc8QsJq39:Jppg4P1U/E6e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

127.0.0.1:123

Targets

    • Target

      2d83d0c300fe635c27864bec49cc6a4c8890ef844a6eedc00c7e2dba6482d694_NeikiAnalytics

    • Size

      72KB

    • MD5

      9ad35eebbc613ed72c7b51cace257dc0

    • SHA1

      f71aae0ebc61c4798245b53e8c918b08723d0efa

    • SHA256

      2d83d0c300fe635c27864bec49cc6a4c8890ef844a6eedc00c7e2dba6482d694

    • SHA512

      5b2015a063f73667589dbf160dab388b1a554b9a3320aaba5fb25c8a5a44e9353d56e19e8cf148da72b494f38dab55a4e37d91ddabde1637c9231069820f5b5d

    • SSDEEP

      1536:IcRp4egJihl116uZAIkPMiE6Mb+KR0Nc8QsJq39:Jppg4P1U/E6e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks