Behavioral task
behavioral1
Sample
6b167f41ac43840e0a28b55aafc60290_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
6b167f41ac43840e0a28b55aafc60290_NeikiAnalytics.exe
-
Size
162KB
-
MD5
6b167f41ac43840e0a28b55aafc60290
-
SHA1
9bddb7478a121768fcf7baabf113a184289ef225
-
SHA256
6ec008c04ccaea3281fc97d9a4c0bc8316b0061bf8ace6d2aaf694a80b882ac8
-
SHA512
2c16ad48c52410d23e50849e5ae7fc5bc26324a8afd5f4d070e0e0119ed5d56aef2511dc6ac7bd2ea915fb2cd5c1b33d1954219348f8ee75b4195e780c8cd029
-
SSDEEP
3072:xhOmTsF93UYfwC6GIout0fmCiiiXAQ5lpBoGYwNNhu0CzhKPDNuBSF:xcm4FmowdHoSgWrXF5lpKGYV0wh6D9F
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6b167f41ac43840e0a28b55aafc60290_NeikiAnalytics.exe
Files
-
6b167f41ac43840e0a28b55aafc60290_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE