Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 17:14
Behavioral task
behavioral1
Sample
437cc0c0e7b5239cc359be51f0cd5d20_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
437cc0c0e7b5239cc359be51f0cd5d20_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
437cc0c0e7b5239cc359be51f0cd5d20_NeikiAnalytics.exe
-
Size
72KB
-
MD5
437cc0c0e7b5239cc359be51f0cd5d20
-
SHA1
7a7c1ce110ecb1e4bbc87969b82a3f10d8197625
-
SHA256
30ae535782e87f20a7460eb9f8b2d0ef395723113b3e012b9cccb77b5c44ff5a
-
SHA512
a3107c66bfc8e4c8ab96bdb0dd3fdb441ec511c870e7041fd0b13e60d445be6b6542f6dddd296afe755d8a915094feccfdfba31ab975e11b9c3121902be910af
-
SSDEEP
1536:IW65BC8M8kt7x9PYk/udVxhY3rH7IMb+KR0Nc8QsJq39:m5BCVr7x9HO7ibHse0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.