Behavioral task
behavioral1
Sample
d568cde0edf9d979a9bbb72befdea460_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d568cde0edf9d979a9bbb72befdea460_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
d568cde0edf9d979a9bbb72befdea460_NeikiAnalytics.exe
-
Size
242KB
-
MD5
d568cde0edf9d979a9bbb72befdea460
-
SHA1
1750611c70574ccce9b384655d7042f756266da6
-
SHA256
21642747f13d619456f81e6d5f5821042c2a505fc679445275af65039f9d6f3c
-
SHA512
c2efacc1651976332b9dc889bd3a11778e5c3d7d19d7280c9e1f68cec02f7f2f90bd1dd5ad9bb7e1aaee21d77df9b68c370ad8aa6d1b5d41c22e2bbcf128a5f2
-
SSDEEP
3072:TUhExYyYt+5bPH1GUoYO/Ge8SKfbzxcwg7es6/Vsb8VKTu549oJMfF/H9N3Ky9NP:1/C+5bMAeUhcX7elbKTua9bfF/H9d9n
Malware Config
Extracted
xworm
land-cio.gl.at.ply.gg:43893
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d568cde0edf9d979a9bbb72befdea460_NeikiAnalytics.exe
Files
-
d568cde0edf9d979a9bbb72befdea460_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ