Behavioral task
behavioral1
Sample
d79b0d96f2e2102474c3ebaccb7c6710_NEIKI.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d79b0d96f2e2102474c3ebaccb7c6710_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
d79b0d96f2e2102474c3ebaccb7c6710_NEIKI
-
Size
24KB
-
MD5
d79b0d96f2e2102474c3ebaccb7c6710
-
SHA1
f3c73f6f2e0a51f52e7a2dd3c0da4a8a6c93d9a9
-
SHA256
6f3759d9be533f75595900b4b338829973134037629a8c27f6725795eadfd93d
-
SHA512
f72a673fc64aaec1fd2c540a0dc70909ad592b76f688df2d49c06317e1d9930fe05e2b71bca187c9de93d904414e95b4279f3ef4b6aa38703d586b855e2bfb66
-
SSDEEP
384:bVCPwFRuFn65arz1ZhdaXFXSCVQTLfjDp6Hnp8:bVCPwFRo6CpwXFXSqQXfjAH+
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource d79b0d96f2e2102474c3ebaccb7c6710_NEIKI unpack001/out.upx
Files
-
d79b0d96f2e2102474c3ebaccb7c6710_NEIKI.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ