Behavioral task
behavioral1
Sample
c404212c19ebab550c741d2d53f0d810_NEIKI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c404212c19ebab550c741d2d53f0d810_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
c404212c19ebab550c741d2d53f0d810_NEIKI
-
Size
32KB
-
MD5
c404212c19ebab550c741d2d53f0d810
-
SHA1
843762ab045b4f29bb8f48e19a33cfa7661e3208
-
SHA256
3c1ab30ce039999e08f64cb53386bf8afe186b78850af9497ac2757e3f6cac8c
-
SHA512
0da36cd4e1594c1613cbafe295c2ad09018fe4e559df8a5a47edb2ecc9769e3b1337c0da1665fb37f0c38b028737b5988bfc6a0124e86d03472df0696669cf09
-
SSDEEP
768:n60kmItpSVtOYCR7CXmOkD+yPkmhUNF6ex:n607QpS+YmmOFP7hUNw
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c404212c19ebab550c741d2d53f0d810_NEIKI
Files
-
c404212c19ebab550c741d2d53f0d810_NEIKI.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE