Behavioral task
behavioral1
Sample
b028fccf29277b8c216510607984de80_NeikiAnalytics.exe
Resource
win7-20240220-en
General
-
Target
b028fccf29277b8c216510607984de80_NeikiAnalytics
-
Size
308KB
-
MD5
b028fccf29277b8c216510607984de80
-
SHA1
d04bd2e2429c8889b30b8d2d6b16b8193a8936e5
-
SHA256
51dc7c98efe2520b0ebdee2693461a715d0de16ff143083fc50ebb6889103644
-
SHA512
e7c12b48c2dddd333c2d269c07aeb51def983f71282cc58115f3ea1e6122ab125cd0bcf450907ff93a7fc4c99f6f1b7542eeec5674057d1c9bdae5a145d90480
-
SSDEEP
6144:9cm4FmowdHoS4/8UJCf4upvUjQSmpikAAKeMjiR:/4wFHoS4kUJE4IuzQifAKjjW
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b028fccf29277b8c216510607984de80_NeikiAnalytics
Files
-
b028fccf29277b8c216510607984de80_NeikiAnalytics.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE