General

  • Target

    20867664e1e1d78248901f8574aa9924548405d8547fa7bf65413294e87ffbab_NeikiAnalytics.exe

  • Size

    3.9MB

  • MD5

    e01943fba69988f32d0b71d440ad8410

  • SHA1

    c68c2e3cb2af942b929a70808fed0e3eb13b0d9c

  • SHA256

    20867664e1e1d78248901f8574aa9924548405d8547fa7bf65413294e87ffbab

  • SHA512

    acb12aecd029b273e4bb465945450df5987cd9f88982411cdf42757f10cb41010b87f1a1e11af62d82a8324fe13a6c203d78f9dfffb4160be58c3dd40d5d3707

  • SSDEEP

    98304:tvgDwcCCpaHZSmWJcEwKuJE8KdOuEEfM7paH6VnwqKkP3y:t/XHZS5aEwxnK5DM7py0nw1Yy

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.146.142:4456

Signatures

  • Metasploit family
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • 20867664e1e1d78248901f8574aa9924548405d8547fa7bf65413294e87ffbab_NeikiAnalytics.exe
    .exe windows:4 windows x86 arch:x86

    1f23f452093b5c1ff091a2f9fb4fa3e9


    Code Sign

    Headers

    Imports

    Sections

  • $PLUGINSDIR/InstallOptions.dll
    .dll windows:4 windows x86 arch:x86

    4b45b7e00344a87332fbd12653854d1a


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/System.dll
    .dll windows:4 windows x86 arch:x86

    fc0224e99e736751432961db63a41b76


    Headers

    Imports

    Exports

    Sections

  • $PLUGINSDIR/ioSpecial.ini
  • $PLUGINSDIR/modern-header.bmp
  • $PLUGINSDIR/modern-wizard.bmp
  • $PLUGINSDIR/nsDialogs.dll
    .dll windows:4 windows x86 arch:x86

    6b5c4f7d679059f68f1269aad3a5cecd


    Headers

    Imports

    Exports

    Sections