Behavioral task
behavioral1
Sample
5512ed3347b4895273f2bc5593931f30_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
5512ed3347b4895273f2bc5593931f30_NeikiAnalytics
-
Size
227KB
-
MD5
5512ed3347b4895273f2bc5593931f30
-
SHA1
277a613e12f2008b76081cf55d415f5147984fd8
-
SHA256
4bb374d56494c99bb5a6d9e7426d6f77c486289b8e3b7257cf3da5c24db45f97
-
SHA512
d28c5467006d41033f471486c8d50e13b8738c3b5b2f3a8abff6456cdf805f5833db95177dbdb79dbb3d4fb6f2756a804c8ed190eb6fb88d0a2a4adf269ee4e9
-
SSDEEP
6144:jvNzUzbF68H3S8+b6uyptXIi9u/mp8saZHRD4v4M84Z9YkF/GeHNHyORQdcIKtT:jvw68XS8+d8HamysaZHRD44M3ZzF/GeZ
Malware Config
Signatures
-
Berbew family
-
Malware Dropper & Backdoor - Berbew 1 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule sample family_berbew -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5512ed3347b4895273f2bc5593931f30_NeikiAnalytics
Files
-
5512ed3347b4895273f2bc5593931f30_NeikiAnalytics.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ