Behavioral task
behavioral1
Sample
824fd8d955d1151302f66ec1c56b8400_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
824fd8d955d1151302f66ec1c56b8400_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
824fd8d955d1151302f66ec1c56b8400_NeikiAnalytics.exe
-
Size
58KB
-
MD5
824fd8d955d1151302f66ec1c56b8400
-
SHA1
154876792da4f25744e0b944c24ba3e3396a5328
-
SHA256
e3f2c1d5d119a09d2955b7f06e02aaf55676b693f262dfcccf9168bac1779894
-
SHA512
b32154fc9f4be1250bdecdd400ef62bd0a70be44a8ffed26af567cb41501cb45d58130836ee983e0764b1ead549eee0991855c57d41e372e77f669962ea492a5
-
SSDEEP
1536:KpROyEcsUN5jsP2bjobRmxU+TCFI5rHOYgJB:Kp8yT5N5jtbjlZCFI5zOYqB
Malware Config
Extracted
xworm
127.0.0.1:14731
4.tcp.eu.ngrok.io:14731
0.tcp.eu.ngrok.io:14731
5.tcp.eu.ngrok.io:14731
7.tcp.eu.ngrok.io:14731
6.tcp.eu.ngrok.io:14731
2.tcp.eu.ngrok.io:14731
-
Install_directory
%AppData%
-
install_file
RADMIR_LAUNCHER.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 824fd8d955d1151302f66ec1c56b8400_NeikiAnalytics.exe
Files
-
824fd8d955d1151302f66ec1c56b8400_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ