Behavioral task
behavioral1
Sample
8abd881c18ea0fe01679d6a4631c3a20_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
8abd881c18ea0fe01679d6a4631c3a20_NeikiAnalytics
-
Size
419KB
-
MD5
8abd881c18ea0fe01679d6a4631c3a20
-
SHA1
cb59ac007fefdb1b8da521b3098e46f6d0e00e6f
-
SHA256
c0426bd34e395cc5baaa349c16fa906fe82b2f751dd3a535805d90d235380c73
-
SHA512
f2cd0fc7160a7d0172bf1cac0ce3088fa2f64baff02c5b093319b82bd455f9344d87fad74ee6d9aa83dca6cfe145b929273a39e2fa8968fe98e6b1167fec3e51
-
SSDEEP
12288:QGkdVUm9VunNv3vhrUluVDFs5ekwI93TkH1m1pcEtQAe:QGkdVUm9VunNv3vhrUluVDFs5ekwI93U
Malware Config
Signatures
-
Berbew family
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule sample family_berbew -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8abd881c18ea0fe01679d6a4631c3a20_NeikiAnalytics
Files
-
8abd881c18ea0fe01679d6a4631c3a20_NeikiAnalytics.exe windows:4 windows x86 arch:x86
7568fd2720750e36a6992434b5b7efe9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetLastError
Sleep
GetLocaleInfoA
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetLocalTime
GetStartupInfoA
VirtualAlloc
VirtualQuery
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
HeapValidate
CloseHandle
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
GetFileType
GetStdHandle
GetCurrentProcess
DuplicateHandle
SetHandleCount
GetCommandLineA
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetFilePointer
ReadFile
GetConsoleMode
GetConsoleCP
GetConsoleOutputCP
WriteFile
SetStdHandle
DeleteFileA
SetConsoleCtrlHandler
MultiByteToWideChar
CreateFileA
WideCharToMultiByte
SetEndOfFile
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 115KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yxbxhpw Size: 16KB - Virtual size: 96KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE