Static task
static1
Behavioral task
behavioral1
Sample
ad400183807761a538f641347eee1930_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad400183807761a538f641347eee1930_NEIKI.exe
Resource
win10v2004-20240419-en
General
-
Target
ad400183807761a538f641347eee1930_NEIKI
-
Size
72KB
-
MD5
ad400183807761a538f641347eee1930
-
SHA1
4ba58d6d0d72882114e859ce8e7a9eff9385e88a
-
SHA256
0ca846507b9a514a41d25d6aca66700616bc2a0a4cff88195ef47ef618c023bf
-
SHA512
f58660449106f553026d358189322b7fb53776f01ec45a7bdb6fcfddc15a9b7fab75eba187fba5c6ef8fb49f390eca5c455edd113014289ab0cf13506defdb2a
-
SSDEEP
1536:xUzOORyuTKxBpkcoIOgm5qyrY4xhzO2dsB:a/Kx8DIOvqeY4PzOXB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad400183807761a538f641347eee1930_NEIKI
Files
-
ad400183807761a538f641347eee1930_NEIKI.exe windows:4 windows x86 arch:x86
0c144496adf6d6951a8195019d714846
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CreateFileA
CreateMutexA
CreateProcessA
DeleteFileA
ExitProcess
GetModuleFileNameA
GetProcessHeap
HeapAlloc
ReadFile
SetFileAttributesA
SetFilePointer
WriteFile
Sections
.text Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE