Behavioral task
behavioral1
Sample
d75d05f31944424e8f12da312c2a9960_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d75d05f31944424e8f12da312c2a9960_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d75d05f31944424e8f12da312c2a9960_NeikiAnalytics
-
Size
21KB
-
MD5
d75d05f31944424e8f12da312c2a9960
-
SHA1
c13b687053354bea543464416366dfa88e40f3f8
-
SHA256
c1451328496c9c88d96ca6b11522baad26ba482489f4a4f597129b3cad02df31
-
SHA512
31514ecc8759247c562aa3d574d51d96d500663cd0b7e67c4cfcfa101dc48dd695e94fb844f49155eb4b7d3338de2ed2852c76642b99cf37b1eb499e4990d250
-
SSDEEP
384:FZcpzCIqdG3A3WUkx38GZDJuJbf1+o44u8gHzUPHvv:SCIqdH/k1ZVcT194jp4PHX
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource d75d05f31944424e8f12da312c2a9960_NeikiAnalytics unpack001/out.upx
Files
-
d75d05f31944424e8f12da312c2a9960_NeikiAnalytics.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ