Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 06:25
Behavioral task
behavioral1
Sample
138b24062fe00b564635601248633c50_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
138b24062fe00b564635601248633c50_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
138b24062fe00b564635601248633c50_NeikiAnalytics.exe
-
Size
72KB
-
MD5
138b24062fe00b564635601248633c50
-
SHA1
5559e7a91a12dc5adc91bb7dd3b16afcb2d4da65
-
SHA256
4f7033ccfbd6fd77dd95f751a3f2a2e457ef3e1535227b3c188453610691c14d
-
SHA512
5bcb7f2cb8c9a7c5a952a7295e7753cfab468a9af9158e64a6cb3e0e23071954e4da404bbf6d4a793959bc60c86e3526e8ec0d770b6dca9cb5c53ee28ddf281a
-
SSDEEP
1536:I2wPI5MXSDty9ZJOka1gGUYAWzmpCW0oMb+KR0Nc8QsJq39:A1SRy9ZY96Duzmp10oe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
127.0.0.1:6666
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.