Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 12:51

General

  • Target

    2a60310d40cf882f78b353769b44db70_NeikiAnalytics.exe

  • Size

    7KB

  • MD5

    2a60310d40cf882f78b353769b44db70

  • SHA1

    6b591a28fbf75d7025bfd80cfe965631edc21bbc

  • SHA256

    0f881ab37317eaa70daac29255c38a6bc3d0257f01819ae74c0497a501eee262

  • SHA512

    76068b0236841d244cc902fe238b8d8d5e96690df09066d4e1d1f8fa0ffb83cdc88f5fdf1ccf97bf00cfde42e7053720ae34087ecd0ac0017c52926611b9be20

  • SSDEEP

    24:eFGStrJ9u0/6Io3nZdkBQAVb6WcLwKZqDeNDMSCvOXpmB:is03oTkBQa2LwVSD9C2kB

Malware Config

Extracted

Family

metasploit

Version

metasploit_stager

C2

192.168.243.128:9999

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a60310d40cf882f78b353769b44db70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2a60310d40cf882f78b353769b44db70_NeikiAnalytics.exe"
    1⤵
      PID:428

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/428-0-0x0000000140000000-0x0000000140004278-memory.dmp

      Filesize

      16KB