Behavioral task
behavioral1
Sample
4a05ce132b97e62e2d53803e7f89d02bd3c57424e62699aea43c098fc1455fa1_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
4a05ce132b97e62e2d53803e7f89d02bd3c57424e62699aea43c098fc1455fa1_NeikiAnalytics
-
Size
283KB
-
MD5
d34affe27303efd466527f7e2580a950
-
SHA1
515522de0fc8f037c5f5800b1c1db784f5390b87
-
SHA256
4a05ce132b97e62e2d53803e7f89d02bd3c57424e62699aea43c098fc1455fa1
-
SHA512
930d9a31e7e141a8c4af56cac68fb5d0e676c8b2ddb7acc77334dde474f8eeb33ca4295983eb76f3e9d8e6b0890b79f5c647110286c9b17e7059b9ada8b9504f
-
SSDEEP
6144:VcNYS99KGGyqRFIqU7lT73sctFM7Pz4pSXJSzAnh:VcWB1zktFSUxAh
Malware Config
Extracted
darkcomet
Slave
bssbig.no-ip.org:699
zymic99k.no-ip.org:699
DC_MUTEX-9UYCUYX
-
InstallPath
winlogon.exe
-
gencode
6dYodXAtJ1da
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
winlogon
Signatures
-
Darkcomet family
-
Processes:
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4a05ce132b97e62e2d53803e7f89d02bd3c57424e62699aea43c098fc1455fa1_NeikiAnalytics unpack001/out.upx
Files
-
4a05ce132b97e62e2d53803e7f89d02bd3c57424e62699aea43c098fc1455fa1_NeikiAnalytics.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 508KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 246KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.text Size: 566KB - Virtual size: 566KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 29KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 56B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ