Behavioral task
behavioral1
Sample
b1623fdb4b9802ad7321331ada772190_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
b1623fdb4b9802ad7321331ada772190_NeikiAnalytics
-
Size
1.8MB
-
MD5
b1623fdb4b9802ad7321331ada772190
-
SHA1
cbc1d9a4b2f72dc0e65228e9e52a2e5b42cf155d
-
SHA256
abcdca75e9c5ffa7eea05608790e0575eb85b3e7b1a2f4d24e23cd5990e84153
-
SHA512
afee99ba8dbb73530ab4a5d02ff0067c1697dc40ab8a32ba152c19ccb790a52372f9170126e5554c342b6427ddaf400a55063f7bbaf5184ebef6591e28128c5b
-
SSDEEP
49152:BezaTF8FcNkNdfE0pZ9ozt4wISK9NcHF9:BemTLkNdfE0pZr8
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
resource yara_rule sample xmrig -
Xmrig family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1623fdb4b9802ad7321331ada772190_NeikiAnalytics
Files
-
b1623fdb4b9802ad7321331ada772190_NeikiAnalytics.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 724KB - Virtual size: 3.0MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE