Behavioral task
behavioral1
Sample
69c0edbb56ee74955f1a6e17fe8fb960_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69c0edbb56ee74955f1a6e17fe8fb960_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
69c0edbb56ee74955f1a6e17fe8fb960_NeikiAnalytics.exe
-
Size
59KB
-
MD5
69c0edbb56ee74955f1a6e17fe8fb960
-
SHA1
9c2764531749c3d9cfdecf4cfc8cfdf681318edc
-
SHA256
4ceb3a3efe9f704cb0f8e8906abd29ba2d00698a1ca0c50171aee332d15fa8d0
-
SHA512
9a37259f83c8ab443ab7a6203e8a73f3a274810136fbb83dac45d2209560d63da74cf7dabc3bf0f96fb6fc6f81860236bb2d318b175714aa5ddb6de73a1817eb
-
SSDEEP
1536:+7o8uN+FHNkGWf2W3Ayrk5tn1OuFjXVQZjtzYDK2z6:+7orN+F6GW+KAAkj0uFjFgtEDK1
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 69c0edbb56ee74955f1a6e17fe8fb960_NeikiAnalytics.exe
Files
-
69c0edbb56ee74955f1a6e17fe8fb960_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 176KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 58KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE