C:\Users\hacked\AppData\Local\Temp\vvunlxbc.pdb
Static task
static1
Behavioral task
behavioral1
Sample
529ae26538c813e6fc17d6799bb4db30_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
529ae26538c813e6fc17d6799bb4db30_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
529ae26538c813e6fc17d6799bb4db30_NeikiAnalytics
-
Size
160KB
-
MD5
529ae26538c813e6fc17d6799bb4db30
-
SHA1
347ce3391234b742aee801f98d69bc989216c156
-
SHA256
6e710307373c47e8276e8fd558e56d9d041ff647ae211810a142a84e4d96d096
-
SHA512
f179087704efff33e39b79b84562b8f9682aed12a5f234197bc27f037ffd7c6d520c868757b355bcee33e4f53b6eedde4ea6927d47537da06cbad0806580f78a
-
SSDEEP
3072:GPn5uxSvcWqtx9Ct30UP0Pg1He5DFdMgde9KXHrJ7Vkm0AO:mzs/9mkUP0owRJukRVN0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 529ae26538c813e6fc17d6799bb4db30_NeikiAnalytics
Files
-
529ae26538c813e6fc17d6799bb4db30_NeikiAnalytics.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 4KB - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ