Behavioral task
behavioral1
Sample
033dcea3ab8b32dcfca333bcbb482780_NEIKI.exe
Resource
win7-20240508-en
General
-
Target
033dcea3ab8b32dcfca333bcbb482780_NEIKI
-
Size
5.0MB
-
MD5
033dcea3ab8b32dcfca333bcbb482780
-
SHA1
0fc0556e14aa8e510b5a774e1db2e2d3568830cb
-
SHA256
d4fb04b8b4bd860c4bac4f7b0582c7e4cdba59315fc4741910ab2b298aa41f3d
-
SHA512
770826d8fe41452bfe9e691c5a8376f57deb14db095c3ae9618ad7bdbd6efc69f2746ba0a0a0ac265cc423786a739beafe2b8b4590f81317dca10f5d60738b2e
-
SSDEEP
98304:BemTLkNdfE0pZrt56utgpPFotBER/mQ32k:Q+856utgpPF8u/p
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
resource yara_rule sample xmrig -
Xmrig family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 033dcea3ab8b32dcfca333bcbb482780_NEIKI
Files
-
033dcea3ab8b32dcfca333bcbb482780_NEIKI.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 724KB - Virtual size: 3.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE