General

  • Target

    73dcb62d75cb061056fcc45b329d4550_NeikiAnalytics.exe

  • Size

    58KB

  • Sample

    240619-br1z1avhlj

  • MD5

    73dcb62d75cb061056fcc45b329d4550

  • SHA1

    b90bd9c447c1669e6c508ab3cbecb32d828ebf62

  • SHA256

    1e21916259c25bd04ea5e0e2f9f2cd06226684297796108c51c73626337106b0

  • SHA512

    4588fe32e2f89efc50c5dc0355788af0aad60b25d2c06e09256390dfb07e601f76596ab8141121f97c6c94d1938648b06a67df6d39bee82d655e5240f8aed015

  • SSDEEP

    1536:+fBL8GYleZEhJ+QYJtiAWQyG6ns6lk0Ns/P46p2Rog:mBg3leZuJ+QYJtdsnlEhKog

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.65:5444

Targets

    • Target

      73dcb62d75cb061056fcc45b329d4550_NeikiAnalytics.exe

    • Size

      58KB

    • MD5

      73dcb62d75cb061056fcc45b329d4550

    • SHA1

      b90bd9c447c1669e6c508ab3cbecb32d828ebf62

    • SHA256

      1e21916259c25bd04ea5e0e2f9f2cd06226684297796108c51c73626337106b0

    • SHA512

      4588fe32e2f89efc50c5dc0355788af0aad60b25d2c06e09256390dfb07e601f76596ab8141121f97c6c94d1938648b06a67df6d39bee82d655e5240f8aed015

    • SSDEEP

      1536:+fBL8GYleZEhJ+QYJtiAWQyG6ns6lk0Ns/P46p2Rog:mBg3leZuJ+QYJtdsnlEhKog

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks