CancelDll
LoadDll
Behavioral task
behavioral1
Sample
b6f94f1aec700c3dbf229bff8ee05800_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b6f94f1aec700c3dbf229bff8ee05800_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
Target
b6f94f1aec700c3dbf229bff8ee05800_NeikiAnalytics
Size
65KB
MD5
b6f94f1aec700c3dbf229bff8ee05800
SHA1
f76197c80acd5624b963d3d1d09d1af91e4e308c
SHA256
d3e4015d0bd98af9c8093166b1ec2ecbda6d5ae53d2b5a92217c6cd720322627
SHA512
94bab26fb3f596d1317724a209129fe3a594cc3d0c90ebc0f8135ca2c16bcc2f9c47bae5d4a55ad3d9c30c3d211d7ee6da4a787abf6b433ce1f81fa62c9de322
SSDEEP
1536:0UIsMWmRYNVK9llltw1mYJTfDElEvz4l9343O6Pi:55D+hPcTfDElMCgO6q
Detects file using ACProtect software.
resource | yara_rule |
---|---|
sample | acprotect |
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
b6f94f1aec700c3dbf229bff8ee05800_NeikiAnalytics |
unpack001/out.upx |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CancelDll
LoadDll
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ