General

  • Target

    b6ab91b8c62bbab6b398144dc29f61d0_NeikiAnalytics.pdf

  • Size

    142KB

  • MD5

    b6ab91b8c62bbab6b398144dc29f61d0

  • SHA1

    28c9a3c257b52ff9e65cf3988ea8345212066503

  • SHA256

    f635dd7f6675f34c58b356d18d42110372d5bb5885345f2bcedbd497c83bb686

  • SHA512

    324690b2da042029aebd0220ebe8e31c889656ac9d078c55875b73193124feb27bf81b4ce4148108b23786f142c70b097bb91fa919a241098542b5e634836b01

  • SSDEEP

    3072:g8AfwijRHUau8ORNQHOWhqTcJE1s0irob1/+:iBFUOOAuWMTcJIsEW

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • b6ab91b8c62bbab6b398144dc29f61d0_NeikiAnalytics.pdf
    .pdf