DllCanUnloadNow
DllGetClassObject
PyInit__ctypes
Behavioral task
behavioral1
Sample
418a309b28c836f014e41c976a898450_NEIKI.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
418a309b28c836f014e41c976a898450_NEIKI.dll
Resource
win10v2004-20240419-en
Target
418a309b28c836f014e41c976a898450_NEIKI
Size
57KB
MD5
418a309b28c836f014e41c976a898450
SHA1
42ceefb1f2aaad79e3d52487af582561da64773a
SHA256
57169c9828fd83254bfca7760e736804b00689bc36d92967b58285f8ae33fa73
SHA512
a8ad9ac3e0627101cf5afbb1e83cd90b5a239a01a26d30a1bbcac84d406f75f24c9ba2206019dc5dae1d4b364a3b2e0c3f3c504e493cae15e848901d08050f00
SSDEEP
1536:kCVHQHNo9PV61CjL/y1QLofhAzwwQapt6TcHIWQPgX7SyDAX:kKwHNo9bf/yCkZAWapt6ToIWQPgXNo
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
418a309b28c836f014e41c976a898450_NEIKI |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
PyInit__ctypes
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE