General

  • Target

    2a503254aef438c291d65711be8a1b70_NeikiAnalytics.exe

  • Size

    72KB

  • Sample

    240525-2b4n3acf3x

  • MD5

    2a503254aef438c291d65711be8a1b70

  • SHA1

    5520187e32dd5ea5beeb60d3bc88b8b4043fe88c

  • SHA256

    20ead5d78b9a987cac82bfaecd0e26f9509e1bd114fbf66d6921ced596c0277d

  • SHA512

    f422898aee4b99629665e3384ccdfa7733017acfee23d7b1822cd9b07c1b94a05d880bd3325be8fe8c73f30d84e0bb4b038cad00f44c280011e63559114d6c41

  • SSDEEP

    1536:IU4vMfVoqSC1+d0HNJZ9ENFQemsNW1fMb+KR0Nc8QsJq39:RXSC1U06QO+e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.37.129:4444

Targets

    • Target

      2a503254aef438c291d65711be8a1b70_NeikiAnalytics.exe

    • Size

      72KB

    • MD5

      2a503254aef438c291d65711be8a1b70

    • SHA1

      5520187e32dd5ea5beeb60d3bc88b8b4043fe88c

    • SHA256

      20ead5d78b9a987cac82bfaecd0e26f9509e1bd114fbf66d6921ced596c0277d

    • SHA512

      f422898aee4b99629665e3384ccdfa7733017acfee23d7b1822cd9b07c1b94a05d880bd3325be8fe8c73f30d84e0bb4b038cad00f44c280011e63559114d6c41

    • SSDEEP

      1536:IU4vMfVoqSC1+d0HNJZ9ENFQemsNW1fMb+KR0Nc8QsJq39:RXSC1U06QO+e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks