Behavioral task
behavioral1
Sample
dee3101bf02efa4989236d12516fc2b0_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dee3101bf02efa4989236d12516fc2b0_NEIKI.exe
Resource
win10v2004-20240426-en
General
-
Target
dee3101bf02efa4989236d12516fc2b0_NEIKI
-
Size
536KB
-
MD5
dee3101bf02efa4989236d12516fc2b0
-
SHA1
5d5dc2ee07a031303cc37ca14c53e95b47cc0fd8
-
SHA256
dfda4fe6763f24a632392499bab56f5d672d508263e9baf32ef04cc49bcbac29
-
SHA512
92ad5fbc42a6fb8d0ba04c62fef594073128af7bcccdaf5aaa3aaf6c65afa1b26196a337bbcc1b0e5d75d816640c9e1bb2bda912309325c6597d84b1fe310533
-
SSDEEP
6144:B0Zrd83mD+VVoaFSvc6BO4AL6mr64g6R:KVd83mD+VVoaF2c88um
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 1 IoCs
resource yara_rule sample family_lumma_v4 -
Lumma family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dee3101bf02efa4989236d12516fc2b0_NEIKI
Files
-
dee3101bf02efa4989236d12516fc2b0_NEIKI.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 84KB - Virtual size: 524KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lif Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE