Behavioral task
behavioral1
Sample
4ae5a98fe317830a67e40eecb5e93660_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ae5a98fe317830a67e40eecb5e93660_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
4ae5a98fe317830a67e40eecb5e93660_NEIKI
-
Size
884KB
-
MD5
4ae5a98fe317830a67e40eecb5e93660
-
SHA1
01a8f9573814abdd069d2453dec3bec90170dae4
-
SHA256
108fe18ff35d698af538607ddc853f8356952abbfca75aeb85f9f5dbc53302ee
-
SHA512
2ff5ef7c696b3aa1e5cda1f721ff56403672bae6307571a7ad0971e07e67681badeec952b13384a0332315c1c5dfb2bf5082f776f1f34049da349017a092359a
-
SSDEEP
24576:gMhfPvI2vST+pJbrJrS8nbN3PWezVUlSK/:rVPvIXT+/XJr7n5fWFlb
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ae5a98fe317830a67e40eecb5e93660_NEIKI
Files
-
4ae5a98fe317830a67e40eecb5e93660_NEIKI.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gtcl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kxvu Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.psfx Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.oncez Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bsp Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ