Behavioral task
behavioral1
Sample
a09bf75db80f3d56c954ef705855ab70_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
a09bf75db80f3d56c954ef705855ab70_NeikiAnalytics
-
Size
103KB
-
MD5
a09bf75db80f3d56c954ef705855ab70
-
SHA1
febfe79162004f49a1de04f0ea1d4a734aa2417f
-
SHA256
f0e38b8061aceba39cf8878b3b7ff3d3024218dba5bdc3e6446b2e307f735bfa
-
SHA512
a439852744d0d37962b5bac83f474f17020b236db01ee04ea9dc72938c3f0081648e8fdecbc0285fc18b0d3e3e9f5e165252eeb83d3950e26c85877c638ca0c5
-
SSDEEP
3072:vhOmTsF93UYfwC6GIoutC5Y5mqZRdu5XYejxxp:vcm4FmowdHoSC5Y55RdudY8
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a09bf75db80f3d56c954ef705855ab70_NeikiAnalytics
Files
-
a09bf75db80f3d56c954ef705855ab70_NeikiAnalytics.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.itext Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE