Static task
static1
Behavioral task
behavioral1
Sample
6effd4e4b18671c341339396642d9720_NEIKI.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6effd4e4b18671c341339396642d9720_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
6effd4e4b18671c341339396642d9720_NEIKI
-
Size
80KB
-
MD5
6effd4e4b18671c341339396642d9720
-
SHA1
f9c72049af272bcba32aab309297922e383468ed
-
SHA256
6092de33315cb4cfe54073cd97d0fe9c723ea65e1c052a33a4d053cbd8fe87eb
-
SHA512
edefd39c8c8b6440a1dabfeb2bf01c05a47f913cc6d1b10f8556329125e9e467d6f717b0a6904be5486f313a5b47be44888ef0aff1774a9a06991a93f17c04eb
-
SSDEEP
1536:XqiITiM94wJhcoyXxERM+2P7vJzrY6T2nB8sW4RQAc/RJJ5R2xOSC4BG:HIWM94sPrM+CrY6KBe4e3rJ5wxO344
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6effd4e4b18671c341339396642d9720_NEIKI
Files
-
6effd4e4b18671c341339396642d9720_NEIKI.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 122KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ