DllCanUnloadNow
DllGetClassObject
PyInit__ctypes
Behavioral task
behavioral1
Sample
37b7bc22c4e97622cfea03f8b0d6eef0_NEIKI.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
37b7bc22c4e97622cfea03f8b0d6eef0_NEIKI.dll
Resource
win10v2004-20240419-en
Target
37b7bc22c4e97622cfea03f8b0d6eef0_NEIKI
Size
56KB
MD5
37b7bc22c4e97622cfea03f8b0d6eef0
SHA1
214888194efcffae093ce18438f4d3929e0d75f5
SHA256
545e7241e7a74ee8afe700f4572172f430a33bb60998981091fc6b6216a2ef08
SHA512
ec2615c7661e7eace754b4a51dd6b33e198e30ae00d9fb935aadd2f583554289106946d916528823f740fa51b3794f4d7f39b3efe903af4a15a941b808d0673c
SSDEEP
1536:x1kY5OKYoqAalcI8/dsd0jgZScuPSjQFzHL1I1QPJn7SyGY7Q:xqY5seAk/+dN6lHhI1QPJnR7Q
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
37b7bc22c4e97622cfea03f8b0d6eef0_NEIKI |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
DllCanUnloadNow
DllGetClassObject
PyInit__ctypes
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE