C:\Users\y\Desktop\EncrypterPOC-main\WindowsFormsApp1\obj\Debug\Windows Security Suite.pdb
Behavioral task
behavioral1
Sample
afe32d4d02c9b74bf9dad8f833f16530_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
afe32d4d02c9b74bf9dad8f833f16530_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
afe32d4d02c9b74bf9dad8f833f16530_NeikiAnalytics.exe
-
Size
208KB
-
MD5
afe32d4d02c9b74bf9dad8f833f16530
-
SHA1
c0fcd71f56a776588e9dec3b2fb1bb174b50303c
-
SHA256
812b7a2cc65b2adb42b870da3aedf4de4d730fa63c19578b4a556e1c58c6c9a8
-
SHA512
d225a5af3208e867ef28c46e0888b630755d35a7504998e8fc3541c871b384c25af5bac14eeb1ee6b46fe9e193356d1224f0201c0b783e9afac90db84c38cdcd
-
SSDEEP
1536:WtWNZ0pnFBamoCr3fAyBGhOyiM3wVf29+kVclR:WdFBamP3fAyZVf29+WYR
Malware Config
Signatures
-
Detect MafiaWare666 ransomware 1 IoCs
Processes:
resource yara_rule sample family_mafiaware666 -
Mafiaware666 family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource afe32d4d02c9b74bf9dad8f833f16530_NeikiAnalytics.exe
Files
-
afe32d4d02c9b74bf9dad8f833f16530_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ