General

  • Target

    f0e46c1b5e03c59f891af2c48f032e80_NEIKI

  • Size

    3.7MB

  • MD5

    f0e46c1b5e03c59f891af2c48f032e80

  • SHA1

    6eefd68ea5fe958f0c999b889cf8e37a0cbc66a7

  • SHA256

    044761804ffbeeeea82fd9a5f01690f8a9f396077949165b990656402fcbbf8e

  • SHA512

    57bb6f47fba335982e2fdb3e95ecfcaa8eae7e2b5d98b00b931f45e122f7d8f29e58189af15b6842b4ff86f94badb53dc70eb57adba47ba80923fc126800a3a0

  • SSDEEP

    98304:pM28qiRjPYpc0OMan4NVRKsnAKsPr+5XobYlHYdKpmx9O35f:63qejPYpcb4bRzd5Rl6lIf

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f0e46c1b5e03c59f891af2c48f032e80_NEIKI
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections