Behavioral task
behavioral1
Sample
163e422c2c698c24a02fbbc12c5050c0_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
163e422c2c698c24a02fbbc12c5050c0_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
163e422c2c698c24a02fbbc12c5050c0_NEIKI
-
Size
456KB
-
MD5
163e422c2c698c24a02fbbc12c5050c0
-
SHA1
46d3e6d8851b16400fa85ec6e17f880ff0bd9010
-
SHA256
2d75352cbbb9725614238371f4144a51251bf073af2109cdef498426b78ba6c1
-
SHA512
bd6870df1bd478f9c0ae4f0c39fc90019b53d3ad45c3e82fa0c001cee2f1ab7fdebd93028ca9db28dddc8c9051160273bfe42ec047baa267a06945d1f95c491f
-
SSDEEP
12288:NPKLyqiZJT9T9+tySdlAy9v8+ELfRowaqELiHO66:NSLeZN9TcYSdlR9HKTNzt6
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 163e422c2c698c24a02fbbc12c5050c0_NEIKI
Files
-
163e422c2c698c24a02fbbc12c5050c0_NEIKI.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bvxzt Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yno Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vzkj Size: 512B - Virtual size: 4KB
.lygia Size: 512B - Virtual size: 4KB
.o Size: 512B - Virtual size: 4KB