Static task
static1
Behavioral task
behavioral1
Sample
NikoLdr.dmp.exe
Resource
win10v2004-20221111-en
General
-
Target
NikoLdr.dmp.exe
-
Size
1012KB
-
MD5
dd769d9b909f17b4447cf610df022e56
-
SHA1
5483d1040f9337dbcac9b83781a685f68e2700ec
-
SHA256
bff80c6e410411d3f204bfc5fe6e4c1ea379c9d80ad9f749d8f928fac6975dfb
-
SHA512
67f3d0c292ab47caf050f810c727a9ab400e321ee9d015a267f4b8aa8d8762e23f3c31c7a9dd4171c96476cc1378ac2fad2771b91e732ed703859d9fbedbb57b
-
SSDEEP
24576:jP/Wjiu2J8mAdOGeA9O2Lqiak+0DsqXxIIhoa:jP22J8mAdTT9NdxxIIm
Malware Config
Signatures
Files
-
NikoLdr.dmp.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 1007KB - Virtual size: 1006KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ