F:\Hacker\code\vb.net\Part1\Binder Example\Binder Example\Binder Example\Binder Example\obj\Release\ViRuS_PaL WwW.ArHaCk.NeT.pdb
Static task
static1
Behavioral task
behavioral1
Sample
7802f0c9a47618388e2986fcbd8bd030_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7802f0c9a47618388e2986fcbd8bd030_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7802f0c9a47618388e2986fcbd8bd030_NeikiAnalytics.exe
-
Size
21KB
-
MD5
7802f0c9a47618388e2986fcbd8bd030
-
SHA1
c53acbdaab77fd0c81aa651a2054a1f907e0bdc6
-
SHA256
f2cef322d232a8b8a9bf7165f7bd871753700e96a057100e2ecd76c751d2ac5c
-
SHA512
db137c18f1da8fe7a5eff4ac3c784d62d103ab7f1bc4063440aba5d5799d9fa776e1e626f38f1faea7502cf4fb1cbb1f5efa96aa07f02001703d796fdbf9498e
-
SSDEEP
384:4fhGKCzusiArbulfa7PC1Lf45g9bpQfZwx/i8/vd1GF:QGKCzusiAr6lPJV9b1Xd1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7802f0c9a47618388e2986fcbd8bd030_NeikiAnalytics.exe
Files
-
7802f0c9a47618388e2986fcbd8bd030_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 512B - Virtual size: 181B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ