Static task
static1
Behavioral task
behavioral1
Sample
e23f4ad614f78dcb3f764230cf7dcac0_NeikiAnalytics.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
e23f4ad614f78dcb3f764230cf7dcac0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
e23f4ad614f78dcb3f764230cf7dcac0_NeikiAnalytics
-
Size
132KB
-
MD5
e23f4ad614f78dcb3f764230cf7dcac0
-
SHA1
b3cc813950096b67918d2390bdc44cd2fd7690c0
-
SHA256
5f60494ac4b93c4fae27a7d1d02dea2bfaa8ace8e4dcf89b08bc4ac5030348d1
-
SHA512
a7c56df4a85b17fb69bd42c953beb751c187a510526c1be31ffb1c71359c6925555fc21a831b0af793cb428f42204104db754a57baf826895a831074ffbfe76b
-
SSDEEP
3072:uaBrGi1vPTm3cf2q7QM0tYwk/cUJNVYRQ2OzSJGbBx3DeUaoc/Q7e2K:VHK6h7QMRhLF2eSIbBx3W47HK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e23f4ad614f78dcb3f764230cf7dcac0_NeikiAnalytics
Files
-
e23f4ad614f78dcb3f764230cf7dcac0_NeikiAnalytics.dll windows:4 windows x86 arch:x86
79b3362178937bf9559741c46bb9e035
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
GetModuleHandleA
GetProcAddress
Sections
.text Size: - Virtual size: 49KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 13KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 23KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.frd0 Size: - Virtual size: 120KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 976B - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.v Size: 131KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ