General

  • Target

    0a1e412082c44b18057a0cb3788c80b93099ca392b04d501b7b784b7d8a25006_NeikiAnalytics.exe

  • Size

    72KB

  • Sample

    240630-nq9a7szgmn

  • MD5

    089f1d13655502beeefd945003031ae0

  • SHA1

    be38729db891aae2e4a00f33926371680a8ffec5

  • SHA256

    0a1e412082c44b18057a0cb3788c80b93099ca392b04d501b7b784b7d8a25006

  • SHA512

    58eda6869c91bd8ca5330cf75d5531d901e24f2917e13fcf58ab4ce4e20146ab47b3bb507f6bfa5ba306e081438394103463acac455178e9b57158077a816f5e

  • SSDEEP

    1536:IrorT8x46bC2yPSpWZywHOqu0Mb+KR0Nc8QsJq39:g676bC2DsZMH0e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

21.177.219.189:6567

Targets

    • Target

      0a1e412082c44b18057a0cb3788c80b93099ca392b04d501b7b784b7d8a25006_NeikiAnalytics.exe

    • Size

      72KB

    • MD5

      089f1d13655502beeefd945003031ae0

    • SHA1

      be38729db891aae2e4a00f33926371680a8ffec5

    • SHA256

      0a1e412082c44b18057a0cb3788c80b93099ca392b04d501b7b784b7d8a25006

    • SHA512

      58eda6869c91bd8ca5330cf75d5531d901e24f2917e13fcf58ab4ce4e20146ab47b3bb507f6bfa5ba306e081438394103463acac455178e9b57158077a816f5e

    • SSDEEP

      1536:IrorT8x46bC2yPSpWZywHOqu0Mb+KR0Nc8QsJq39:g676bC2DsZMH0e0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks