Behavioral task
behavioral1
Sample
868c5619e860938c6dd343d460748a10_NEIKI.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
868c5619e860938c6dd343d460748a10_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
868c5619e860938c6dd343d460748a10_NEIKI
-
Size
154KB
-
MD5
868c5619e860938c6dd343d460748a10
-
SHA1
53efa63188c2fa8a66bc42afbbb988c6cbd1529f
-
SHA256
3fb4553205e3d970641ed2667c601ecd07844bf4d6f8c5f65aeebed55884de70
-
SHA512
7a3fb405ebaee8d379f1bdaf72aca38d4122b08463bd477df109df0d490cca306efc44e780e659bea8c33b0f27c6c7b3300c6480f5b85981996e2aa518998fe2
-
SSDEEP
3072:wvs4dDXEGCLElS1Tj4mYWR/R4nkPR/1aVuyN6pnGNxMBzP1UgGS8aA:sPDLCL9Io5R4nM/40yN6gmzPWaA
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 868c5619e860938c6dd343d460748a10_NEIKI
Files
-
868c5619e860938c6dd343d460748a10_NEIKI.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tn Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.f Size: 512B - Virtual size: 4KB