Behavioral task
behavioral1
Sample
d01f66c305986056f594d02b7fbf7040_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d01f66c305986056f594d02b7fbf7040_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d01f66c305986056f594d02b7fbf7040_NeikiAnalytics
-
Size
7KB
-
MD5
d01f66c305986056f594d02b7fbf7040
-
SHA1
3b8ed3b3c129cd54197113df70b4af3f6a468fe9
-
SHA256
7f253807046569c548c04b25fd42df40619e998fac36622b0897cbfbb0e7fad5
-
SHA512
8c5af6a2f65bc5bf7180751d1fec040826e7a38f50c0ad9a228fe42ad237a91a54bede42621ec70fcabc8a388c3e7dac272d4a0d1028661e70f5dc08fea4470f
-
SSDEEP
192:v62fN/CwqV1VucYYSsQHs51dRFfQnFm2jOT:vN/QPpYYS5QdRJgYLT
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d01f66c305986056f594d02b7fbf7040_NeikiAnalytics
Files
-
d01f66c305986056f594d02b7fbf7040_NeikiAnalytics.exe windows:1 windows x86 arch:x86
f9ade0aa18f660a34a4fa23392e21838
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
Sections
UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE