Behavioral task
behavioral1
Sample
321644998157c8ac024911e178944c20_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
321644998157c8ac024911e178944c20_NeikiAnalytics
-
Size
227KB
-
MD5
321644998157c8ac024911e178944c20
-
SHA1
e692898108f5199b80893a7c1a3a968e3195772b
-
SHA256
81fc46f796ce24d8fa00dc9c926a9be54e6aa3f3d2077e754732474ddce369d8
-
SHA512
1e01c6a131fc3f55f73bcc16540942661e10fc6922914c95c86467d6ff8350904926cdf1f465659fb19a7c5a7a98a5b03a34248615ac50725fe1290b8ba0a6e2
-
SSDEEP
6144:jvNzUzbF68H3S8+b6uyptXIi9u/mp8saZHRD4v4M84Z9YkF/GeHNHyORQdcIKtq:jvw68XS8+d8HamysaZHRD44M3ZzF/GeQ
Malware Config
Signatures
-
Berbew family
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule sample family_berbew -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 321644998157c8ac024911e178944c20_NeikiAnalytics
Files
-
321644998157c8ac024911e178944c20_NeikiAnalytics.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ