Static task
static1
Behavioral task
behavioral1
Sample
b7f269d3805d21d1c179d085763e7d80_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b7f269d3805d21d1c179d085763e7d80_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
b7f269d3805d21d1c179d085763e7d80_NeikiAnalytics.exe
-
Size
80KB
-
MD5
b7f269d3805d21d1c179d085763e7d80
-
SHA1
fd4c5e4f6e1fc1699a2a691f4270d60e2370d50b
-
SHA256
64e8da599b2465b71b62fa00e37eb4d7e43f05310bf1801d6922f14607e6b1e4
-
SHA512
6c4ddc9241b7856ed37bca9d8ae35acaa0ba1c7955e518babe4fd3cb402f1135c70e7bee410bbdacf62e7632b97ee53ee15b523d308bf51b11b8fa1515177858
-
SSDEEP
1536:XUAv9A6cc8zNP5+6vqrBzm98sNcXEM5vcPIwQpO8EArbRRQA0aRJJ5R2xOSC4BG:1vTNV6vw5MMXB5SFQpREoeGrJ5wxO344
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7f269d3805d21d1c179d085763e7d80_NeikiAnalytics.exe
Files
-
b7f269d3805d21d1c179d085763e7d80_NeikiAnalytics.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.reloc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 122KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ