\\EXSYMBOLS\SYMBOLS\INTERNAL\SYM6944.0\ntx\rtl\USA\exe\MIGRATE\gw5mig\gw5mig.pdb
Static task
static1
Behavioral task
behavioral1
Sample
db6f77a40762a1ed18f6f1b10a69e2b0_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
db6f77a40762a1ed18f6f1b10a69e2b0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
db6f77a40762a1ed18f6f1b10a69e2b0_NEIKI
-
Size
10KB
-
MD5
db6f77a40762a1ed18f6f1b10a69e2b0
-
SHA1
1d393ed2842180dc238b6e57d28849f064f135a4
-
SHA256
ac4bd1be0aec289ca0a965e4e75b958cf502075eb8782d9b65025726bd940ba2
-
SHA512
6e8a2f19ad8d24f5530e0d0873e79e044be653aff75154e3b77cc2ecec90edf7dbfc47bf0d708b688ba1650c16242fede7ad0abd02b221b84caa7779975687b4
-
SSDEEP
192:T2vV3uImXCZplrQGglkiNBMYWGR5XRWXaBPSTd7dnBPKTdqZ:qMIm0nEG8N7WoXRWOP07dBPcI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db6f77a40762a1ed18f6f1b10a69e2b0_NEIKI
Files
-
db6f77a40762a1ed18f6f1b10a69e2b0_NEIKI.exe windows:4 windows x86 arch:x86
087c2e3cc9f6ca6d9cee5c9e8bb10b63
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mlmig32
ord32
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
_except_handler3
kernel32
GetProcAddress
GetModuleFileNameA
QueryPerformanceCounter
GetStartupInfoA
GetCurrentProcess
TerminateProcess
GetModuleHandleA
SetCurrentDirectoryA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
user32
CharNextA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ