Behavioral task
behavioral1
Sample
d7f50be4e289ff0f4abdd8af56abbfa0_NEIKI.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d7f50be4e289ff0f4abdd8af56abbfa0_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
d7f50be4e289ff0f4abdd8af56abbfa0_NEIKI
-
Size
1.8MB
-
MD5
d7f50be4e289ff0f4abdd8af56abbfa0
-
SHA1
4ca06165ae9d7e2699f527edbf2c62bd44036098
-
SHA256
964f8dd4827391101d55788412314698cf4223a151ca977558eb5cdc78ff9158
-
SHA512
6bffdcc8b46cc327e3c38e0a495d3a398041e6449fd5a90e5c670efc79fd4352b5d89eadf655c440f70ad60a09f14f79a5b06864ce7352bfaa80d57177545a74
-
SSDEEP
49152:sDQDpo/gB2d7uhoxjfGQpuW5EWLbV5WFQZN:sDsotTokZ5WGZN
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7f50be4e289ff0f4abdd8af56abbfa0_NEIKI
Files
-
d7f50be4e289ff0f4abdd8af56abbfa0_NEIKI.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tn Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.f Size: 512B - Virtual size: 4KB