Behavioral task
behavioral1
Sample
53e57d2b66a284522a8f04cec0342320_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
53e57d2b66a284522a8f04cec0342320_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
53e57d2b66a284522a8f04cec0342320_NEIKI
-
Size
2.0MB
-
MD5
53e57d2b66a284522a8f04cec0342320
-
SHA1
e71e78812216de6a5838763d0356944b1fc231bc
-
SHA256
5713f07baf22c092242040fc93bf0bb08309508e4fe33cfa5b63cc3922bf8b62
-
SHA512
a949ff29db58427a64c5aa7c5641a65bcba4275c834208105e04d9ebf2e7d00499ee3f3e6687ac9f631c7787c33fa269935187eea9ebfdbb5811a40ce99450a0
-
SSDEEP
49152:370lX2qjU3q4LEUFByB957BJWi4c+jOb5Hz4:r0lG04LxFQB9lBJLejOs
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53e57d2b66a284522a8f04cec0342320_NEIKI
Files
-
53e57d2b66a284522a8f04cec0342320_NEIKI.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.jxmnr Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lpkez Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.g Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.d Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE