Behavioral task
behavioral1
Sample
d42c4e1c414a5f26cbf6eb4f60974810_NEIKI.exe
Resource
win7-20231129-en
General
-
Target
d42c4e1c414a5f26cbf6eb4f60974810_NEIKI
-
Size
346KB
-
MD5
d42c4e1c414a5f26cbf6eb4f60974810
-
SHA1
10edb1d21ad4ec816d17f11481d4f08caf6486ec
-
SHA256
5be90d4e2ad24ab2164e248ae1fb2a19b542fc382d911f4639c652f69cf1b679
-
SHA512
7023cc67acfd494b00842e09da9e468b287e760eb73aa7fa177805a35f0098b64e2ca9ff5b9876bd93257fd0419896bbca5a8d9953c9e76b2c43e8430446de00
-
SSDEEP
768:XOpQNwC3BESe4Vqth+0V5vKmyLylze70wi3BEmup/pQNwC3BESe4Vqth+0V5vgGe:+eT7BVwxfvEFwjRuBeT7BVwxfvKZ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d42c4e1c414a5f26cbf6eb4f60974810_NEIKI
Files
-
d42c4e1c414a5f26cbf6eb4f60974810_NEIKI.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 41KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bhMTbifI Size: 5KB - Virtual size: 4KB
DoWvHLzy Size: 16KB - Virtual size: 16KB
aUMvYwIg Size: 40KB - Virtual size: 40KB
mVCYllpy Size: 12KB - Virtual size: 12KB
PmmKGNXf Size: 1024B - Virtual size: 579B
dtxAXdPh Size: 512B - Virtual size: 313B
GTTWaxos Size: 11KB - Virtual size: 11KB
wArzuanV Size: 5KB - Virtual size: 5KB
mWnkXuvo Size: 150KB - Virtual size: 149KB
OCFcoCZc Size: 18KB - Virtual size: 18KB