Behavioral task
behavioral1
Sample
346f75626db34440e978fff9da431bd0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
346f75626db34440e978fff9da431bd0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
346f75626db34440e978fff9da431bd0_NeikiAnalytics
-
Size
61KB
-
MD5
346f75626db34440e978fff9da431bd0
-
SHA1
5a4df327f84f33cd0c4db6c7571d4c5dfe2b7160
-
SHA256
5c58edf5de6700f854038295a3431fc62c8956ca82e7e8e1ace5628b0244f4c1
-
SHA512
d45e94e68c3ba532de7c5659981cb9decfe0ee1158b656dc4652aa3bbe4e40162789c161f9bb284c2356e1d2fa83bf7f7a2eca90ac15ea578ff5802e0ec32e91
-
SSDEEP
1536:jAKOwdnGy/pTMf96fb2P5SWB6SFbOs15:VVdv/VAIfb2JFbOs15
Malware Config
Extracted
xworm
127.0.0.1:4299
half-cuba.gl.at.ply.gg:4299
-
Install_directory
%ProgramData%
-
install_file
xrt.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 346f75626db34440e978fff9da431bd0_NeikiAnalytics
Files
-
346f75626db34440e978fff9da431bd0_NeikiAnalytics.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ