Behavioral task
behavioral1
Sample
4d582ca05ffcf4b22dfeaa7aabdd3cc0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4d582ca05ffcf4b22dfeaa7aabdd3cc0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4d582ca05ffcf4b22dfeaa7aabdd3cc0_NeikiAnalytics
-
Size
6.5MB
-
MD5
4d582ca05ffcf4b22dfeaa7aabdd3cc0
-
SHA1
0889823b03f20cfbafc1e405f0cf3f02aaf02762
-
SHA256
5615bb53926f17bbbd75a942df90f9a8dc6629b6c3b6224b79d3aa0039e5a9a5
-
SHA512
f17e583ed332832adf9e597e05a7caa8fbf77394255eedb6a390ceb40301317525c314384f8f92b898138af9fd777b4f4f5ea130c858079f0003846a8059978c
-
SSDEEP
196608:P9TAIi0DnQTW1xkjM2JbYRmcjPtzSVlJT0xw:lTATM1aYRlJSV/Iw
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d582ca05ffcf4b22dfeaa7aabdd3cc0_NeikiAnalytics
Files
-
4d582ca05ffcf4b22dfeaa7aabdd3cc0_NeikiAnalytics.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 641KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 97KB - Virtual size: 270KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 191KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 42KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 7.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 5.6MB - Virtual size: 5.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 16B - Virtual size: 4KB
IMAGE_SCN_MEM_READ