General

  • Target

    2b2010f8b09ea5133eeaf3a44c75dbe0_NeikiAnalytics.pdf

  • Size

    230KB

  • MD5

    2b2010f8b09ea5133eeaf3a44c75dbe0

  • SHA1

    b4704d9b88fcb3a8ed49d50bbd90f7ed2ef8121c

  • SHA256

    dfbf24c44ca7883b6d757c983079d843cfecac17e2c95878375cea3cf5904f25

  • SHA512

    21e68aba95a5d9878fc5a1a0ebae1a0fb0640e71361560a0797d3b849ff53bcfdb858dc4017cf99531304804480ed76b2ecbb3d5f0583f51841ece37f9052f58

  • SSDEEP

    6144:X4AumT2tPWKJUOcGWI9wvXZD+R0XnbLmz:Xxupt72newPZDxbCz

Score
6/10

Malware Config

Signatures

  • Malformed or missing cross-reference table in PDF

    Malformed or missing cross-reference tables are often used to evade detection

Files

  • 2b2010f8b09ea5133eeaf3a44c75dbe0_NeikiAnalytics.pdf
    .pdf