Behavioral task
behavioral1
Sample
0e9a7fbf03be67ff60b264bbed59c8d0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
0e9a7fbf03be67ff60b264bbed59c8d0_NeikiAnalytics
-
Size
440KB
-
MD5
0e9a7fbf03be67ff60b264bbed59c8d0
-
SHA1
1d876b8d99868d9bca37ffcbd31afc6295872e96
-
SHA256
854d7e89130811ebf03fa3ee7075a1e23168561664f232cbb6eba1b249fb5335
-
SHA512
ef061361fdce5bedd3950e4bd1f1cd7052cdcd584407f7179e97877779cf73773f141efe15e61c0ec657981afa66a39649f09fb12420cee28ddf3f3f6dcac748
-
SSDEEP
6144:xozXQKqfmiiyWwuiFOLeyOV0R7YRXxMSaAv:xgXQKSLpOCtV0R8xMSaAv
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e9a7fbf03be67ff60b264bbed59c8d0_NeikiAnalytics
Files
-
0e9a7fbf03be67ff60b264bbed59c8d0_NeikiAnalytics.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 391KB - Virtual size: 390KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE