General

  • Target

    96ccf6cdedae9f52a1ea6cf750071170_NeikiAnalytics.exe

  • Size

    72KB

  • Sample

    240619-gtf1hazdmj

  • MD5

    96ccf6cdedae9f52a1ea6cf750071170

  • SHA1

    87ad475f9aa1ac5c67a8118df81a71efdc07098c

  • SHA256

    3839bb1bdc73f4306abc83b79e070a49bb7831ca51b7b62a62ae1023103f0d9e

  • SHA512

    a2be077f6f17c6672df79cc06a6caa4e012377bb259fa0d94702df8e59feab53d7a2c572f88c58aa414ca2b56459df13498e2d5daf6bfc02fffb141cfbaabce8

  • SSDEEP

    1536:IehNZCeR0KwI55rZzur48OKPeRvMb+KR0Nc8QsJq39:xPZTR0KwI559zgFPexe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.0.2.94:4444

Targets

    • Target

      96ccf6cdedae9f52a1ea6cf750071170_NeikiAnalytics.exe

    • Size

      72KB

    • MD5

      96ccf6cdedae9f52a1ea6cf750071170

    • SHA1

      87ad475f9aa1ac5c67a8118df81a71efdc07098c

    • SHA256

      3839bb1bdc73f4306abc83b79e070a49bb7831ca51b7b62a62ae1023103f0d9e

    • SHA512

      a2be077f6f17c6672df79cc06a6caa4e012377bb259fa0d94702df8e59feab53d7a2c572f88c58aa414ca2b56459df13498e2d5daf6bfc02fffb141cfbaabce8

    • SSDEEP

      1536:IehNZCeR0KwI55rZzur48OKPeRvMb+KR0Nc8QsJq39:xPZTR0KwI559zgFPexe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks