c:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\root\0c563c2d\479865b4\App_Web_ths3loie.pdb
Behavioral task
behavioral1
Sample
1cc61a8fcf43f1d040a8bc795db6e970_NEIKI.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1cc61a8fcf43f1d040a8bc795db6e970_NEIKI.dll
Resource
win10v2004-20240419-en
General
-
Target
1cc61a8fcf43f1d040a8bc795db6e970_NEIKI
-
Size
6KB
-
MD5
1cc61a8fcf43f1d040a8bc795db6e970
-
SHA1
3f9d39d73e400bd7c8ef9a5186bbca9b4ba89889
-
SHA256
7f740fa56f86fb4497d421b5ed52b1779a834fb4494f6c39978f7b420dbf9182
-
SHA512
c8e65e0ad2a2114b856b59dedc2c5c98811818c6620ec3a4a3948f757412c2b7484d9ad8967aabbada4734c787bd56dd6c6d0c8b497b69a012c50982228a88dd
-
SSDEEP
96:dpJNLceZc8xWMbf0wT3e5mhlGepM5MQS:zJNosc8xWMbFT3eKMQMA
Malware Config
Extracted
metasploit
windows/reverse_tcp
18.139.9.214:14564
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1cc61a8fcf43f1d040a8bc795db6e970_NEIKI
Files
-
1cc61a8fcf43f1d040a8bc795db6e970_NEIKI.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ