Behavioral task
behavioral1
Sample
496d4238cfe771ca575ca8899ece96d0_NEIKI.exe
Resource
win7-20240419-en
General
-
Target
496d4238cfe771ca575ca8899ece96d0_NEIKI
-
Size
226KB
-
MD5
496d4238cfe771ca575ca8899ece96d0
-
SHA1
d8ff03fcff2bf2fee476bce6daa967e12ae5c734
-
SHA256
f1806ec293273c4a499ed2e5bfc7d4ab3901b932cce79cf19a8808f163bacd71
-
SHA512
82b60f3dc02c740db24cab60407a4f36d58d91d484e3c30ae2005b77b169b0306ed24a5b82d5d3bcdc935a1d5366dba7b5d3d2c5a03378ff7d5bef0c58cccdd0
-
SSDEEP
6144:jvNzUzbF68H3S8+b6uyptXIi9u/mp8saZHRD4v4M84Z9YkF/GeHNHyORQdcIKtK:jvw68XS8+d8HamysaZHRD44M3ZzF/GeQ
Malware Config
Signatures
-
Berbew family
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule sample family_berbew -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 496d4238cfe771ca575ca8899ece96d0_NEIKI
Files
-
496d4238cfe771ca575ca8899ece96d0_NEIKI.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ