Behavioral task
behavioral1
Sample
eec637ada4e01407deb6d8f8485b1050_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eec637ada4e01407deb6d8f8485b1050_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
eec637ada4e01407deb6d8f8485b1050_NEIKI
-
Size
1.6MB
-
MD5
eec637ada4e01407deb6d8f8485b1050
-
SHA1
1cbe83db590d167b1b60ebebd0962e7a60773992
-
SHA256
9948de74149bb19d37c33473d0f362910810111736963e265596f57ef5e48f92
-
SHA512
944976a841a3a56c0e927a3531a7c71832a739cf302adac4ed9a8aa4ae5340d30dc15756964d74a6055e3eee6b9fb1c1b6223709a6eb8ed00b4d5ce3487eca33
-
SSDEEP
49152:+4LS4gboEdAOLKPTBWNM0bdRnMpEt38rET:+oS4coFoKbBZ0bd1Mps38U
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eec637ada4e01407deb6d8f8485b1050_NEIKI
Files
-
eec637ada4e01407deb6d8f8485b1050_NEIKI.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 60KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.g Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qhw Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE