Behavioral task
behavioral1
Sample
0cd30e9ed9762a6edeef7a752f7b5710_NEIKI.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0cd30e9ed9762a6edeef7a752f7b5710_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
0cd30e9ed9762a6edeef7a752f7b5710_NEIKI
-
Size
93KB
-
MD5
0cd30e9ed9762a6edeef7a752f7b5710
-
SHA1
6a0297128971ac7bfdda2ebd59d34572932fb6e5
-
SHA256
be1bf16be32e9f438f6950d091f6ef36eefdc1396343cce41c3c31ae5cb8d281
-
SHA512
41fb7cf28b84028ee1a3ed7809f9ba24b12c2ec2af9269c61daf0ce12685ece6442e48fb62e31f48228d1a0f4302a20d53dfa2ad02a9087dd27601b3ce7478c5
-
SSDEEP
1536:EiRVCaKgzbLc54hukfgvYnouy8/V1Ayj4m/QWR/Rlq88vlnRqPR/1aViDRknJM24:ECjbLl/gvQoutt1Tj4mYWR/R4nkPR/1t
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cd30e9ed9762a6edeef7a752f7b5710_NEIKI
Files
-
0cd30e9ed9762a6edeef7a752f7b5710_NEIKI.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.btnj Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.t Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE