Static task
static1
Behavioral task
behavioral1
Sample
5bee32a6ef02c1b7774fc69c42e69630_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5bee32a6ef02c1b7774fc69c42e69630_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5bee32a6ef02c1b7774fc69c42e69630_NeikiAnalytics
-
Size
64KB
-
MD5
5bee32a6ef02c1b7774fc69c42e69630
-
SHA1
4f7d9fd05ee9e748c5f9e2e19ddc57498ef977c4
-
SHA256
a09a7d140ca49bd0bb1c5e81e82ea3d20421ecc4e2033f6d4ecc1e3fd5934b2e
-
SHA512
82debcc42c6140de559e7fd64267f148b866595d535d5c2c8197bb189ad130e5ce5fce66a38433686646677b01582e0d80b7cdca37e4de4ee85696d03edb8e7b
-
SSDEEP
768:OqMB9je/wyr728Balo3hn/aEmo0GC2IDGUW+zLCHXla6266adl6rC/1H5mXdnhg6:TMX6DZI2Sns3l+aP6M+V1iL+iALMH6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bee32a6ef02c1b7774fc69c42e69630_NeikiAnalytics
Files
-
5bee32a6ef02c1b7774fc69c42e69630_NeikiAnalytics.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fldo Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ