Behavioral task
behavioral1
Sample
b6d164fa2fe2803ed25fdf0744b53110_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b6d164fa2fe2803ed25fdf0744b53110_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b6d164fa2fe2803ed25fdf0744b53110_NeikiAnalytics
-
Size
1.6MB
-
MD5
b6d164fa2fe2803ed25fdf0744b53110
-
SHA1
fd7016c5b035d36e7a8df35871f7a63d9ea97f73
-
SHA256
5ee156620531196de6750a72b430f4ada571dbedf2727e66c36f73ac0a710416
-
SHA512
af2e7aab184e4292af96237862e5804927f82661face686d72b7e59271aef1440cc777d06b8f97a54f6c7500bec725d51d00418eb64f0674a90669ad97cc0bce
-
SSDEEP
24576:gfUI4pymwV01uIztSCRyouId0fbuPlly2w2BCp1laAfFq1thg5AGFsElWuv8IR:8U1lgIztdyOdl7R+1lauot2BOEldvT
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6d164fa2fe2803ed25fdf0744b53110_NeikiAnalytics
Files
-
b6d164fa2fe2803ed25fdf0744b53110_NeikiAnalytics.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gtcl Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kxvu Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.psfx Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.oncez Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bsp Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ