h:\Secret\Hacker.KeySpy\obj\Debug\svchost.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bb19937f4f58a2ede7087f9883428c90_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
bb19937f4f58a2ede7087f9883428c90_NeikiAnalytics
-
Size
75KB
-
MD5
bb19937f4f58a2ede7087f9883428c90
-
SHA1
eb51d86bd39ed73bd27042076a5d9a6c9a29d6b3
-
SHA256
42516088aad2dd700ab5d7c9f64b1b47e4d214622c9d0fb080b2dfc874c9d7a5
-
SHA512
526033be6a523ebfa21499ad9553215f458389881ba3cb19cc91fd34ee27359d94624189645a294df5ae50ed1f92fd440615d7a4885cc5cb11f8b1106438496a
-
SSDEEP
1536:hNjum7Ynydw8KwHpF73i6EBXlLOUpEpde6L/Qt7OF/4u:hNjum0ydDKqX0LOUpEpduFC/4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb19937f4f58a2ede7087f9883428c90_NeikiAnalytics
Files
-
bb19937f4f58a2ede7087f9883428c90_NeikiAnalytics.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE