atmadm.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ac1e4a15f6ecc221be18a7a3464171a0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ac1e4a15f6ecc221be18a7a3464171a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
ac1e4a15f6ecc221be18a7a3464171a0_NeikiAnalytics
-
Size
1.7MB
-
MD5
ac1e4a15f6ecc221be18a7a3464171a0
-
SHA1
91a018d50ca2b27cd7bddc1ba696957dfe0abf0d
-
SHA256
e89673a8fec7d9218e6ceae9fccde0b82c6e66ca48cd6b657e3918da1f39bde8
-
SHA512
3b0877f98cd58d6a706edbd5834438fc303cb7da9d78f55944ff03fc88267621f60543b1ad8094b117d68db2f1bcfaf4c5a13416465811eb084e0ac6e0ecf962
-
SSDEEP
24576:UH8b/8OuWWh4f1tLeyWcRq4aVE6Ehg7mM+M6RkMkIM7gE6Eh67W:UjOuWWhipXqD0g7mM+M6RkMkIM7I067W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac1e4a15f6ecc221be18a7a3464171a0_NeikiAnalytics
Files
-
ac1e4a15f6ecc221be18a7a3464171a0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
a4efbf89b80e444ba42d503698698324
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
msvcrt
__set_app_type
_except_handler3
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
sprintf
_strlwr
malloc
putchar
_controlfp
printf
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DeviceIoControl
FormatMessageW
WideCharToMultiByte
CloseHandle
CreateFileA
GetModuleHandleA
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ