Analysis
-
max time kernel
151s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 12:51
Behavioral task
behavioral1
Sample
2a60310d40cf882f78b353769b44db70_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a60310d40cf882f78b353769b44db70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2a60310d40cf882f78b353769b44db70_NeikiAnalytics.exe
-
Size
7KB
-
MD5
2a60310d40cf882f78b353769b44db70
-
SHA1
6b591a28fbf75d7025bfd80cfe965631edc21bbc
-
SHA256
0f881ab37317eaa70daac29255c38a6bc3d0257f01819ae74c0497a501eee262
-
SHA512
76068b0236841d244cc902fe238b8d8d5e96690df09066d4e1d1f8fa0ffb83cdc88f5fdf1ccf97bf00cfde42e7053720ae34087ecd0ac0017c52926611b9be20
-
SSDEEP
24:eFGStrJ9u0/6Io3nZdkBQAVb6WcLwKZqDeNDMSCvOXpmB:is03oTkBQa2LwVSD9C2kB
Malware Config
Extracted
metasploit
metasploit_stager
192.168.243.128:9999
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.