PyInit__matfuncs_expm
Behavioral task
behavioral1
Sample
ec69974aa80c7484340cf42668bad730_NEIKI.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ec69974aa80c7484340cf42668bad730_NEIKI.dll
Resource
win10v2004-20240508-en
General
-
Target
ec69974aa80c7484340cf42668bad730_NEIKI
-
Size
149KB
-
MD5
ec69974aa80c7484340cf42668bad730
-
SHA1
b8713d0d75c224ea63a2d962fe177ff42145bebe
-
SHA256
0508e583b12cd94a910c25eb642ff6ee3c96c10c02da0fe76095b7da7a738463
-
SHA512
bf2ee8a8b583053e5da4519349058c874d68a750510e9c9ffcc6f2baaf9861c48cf6ccd572fa963ee3f6209a953b07a1dbec3dbdfe6fb5b180e7b63c7e556372
-
SSDEEP
3072:UYMQFdA0k2CI8jGPH9NnysgYTc1CVk+EfjI5D2Cdtd:UxqC3/Iu6HRgmc1CVT3td
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec69974aa80c7484340cf42668bad730_NEIKI
Files
-
ec69974aa80c7484340cf42668bad730_NEIKI.dll windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
Exports
Exports
Sections
UPX0 Size: - Virtual size: 364KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 147KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE