Behavioral task
behavioral1
Sample
f96999679e0b7369fe6e1ebe5ef42170_NEIKI.exe
Resource
win7-20240419-en
General
-
Target
f96999679e0b7369fe6e1ebe5ef42170_NEIKI
-
Size
3.2MB
-
MD5
f96999679e0b7369fe6e1ebe5ef42170
-
SHA1
ac8a82614a916def6338cff32769620f1d92f455
-
SHA256
3b0692ad35680e7cb57a263a18635a95cf4d0c02bd589087b704a1806cda94e9
-
SHA512
763a812ef8dcb7d26950e15175048dfd175cb08e884f5fcceb74c7f7e2a66ca47cf2b6b8fb6b12b8585cc35a005b0984f699a13b1f913b355632619b89029abb
-
SSDEEP
98304:N0GnJMOWPClFdx6e0EALKWVTffZiPAcRq6jHjc40U:NFWPClFkU
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
resource yara_rule sample xmrig -
Xmrig family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f96999679e0b7369fe6e1ebe5ef42170_NEIKI
Files
-
f96999679e0b7369fe6e1ebe5ef42170_NEIKI.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 1.3MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 525KB - Virtual size: 528KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE