Behavioral task
behavioral1
Sample
8a265a6b0a142fcd1e3354286ab4e560_NEIKI.exe
Resource
win7-20240508-en
General
-
Target
8a265a6b0a142fcd1e3354286ab4e560_NEIKI
-
Size
1.7MB
-
MD5
8a265a6b0a142fcd1e3354286ab4e560
-
SHA1
fb5dd750fc6db785334266158bb7bac960a17d9c
-
SHA256
71a6372633e20802da17d6e6ef7f01025655840192178dcd08aa623cca1bf837
-
SHA512
128ca85c311b79715052ec1a11c02e75195df239a06b0f830eddf0e620c5db8aa294e27cf74805bb8792bf7861729c28650ad6c2ba627f3b4956462c73c00acc
-
SSDEEP
49152:BezaTF8FcNkNdfE0pZ9ozt4wIXSLOmL+2v0Hg:BemTLkNdfE0pZrs
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
resource yara_rule sample xmrig -
Xmrig family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a265a6b0a142fcd1e3354286ab4e560_NEIKI
Files
-
8a265a6b0a142fcd1e3354286ab4e560_NEIKI.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 724KB - Virtual size: 3.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE