Behavioral task
behavioral1
Sample
33bb90f9b3da549cfa9b056caf986cc0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
33bb90f9b3da549cfa9b056caf986cc0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
33bb90f9b3da549cfa9b056caf986cc0_NeikiAnalytics.exe
-
Size
85KB
-
MD5
33bb90f9b3da549cfa9b056caf986cc0
-
SHA1
0b962561e419470b39ab46eafd2e8c696af4a0c7
-
SHA256
c9715d04cf6b83051179c904a9ab7d5c87e1ec9e6d48965b501a86d432d0aa91
-
SHA512
31a3db8f6299fb0e9bcfc186fc24ec67c4d16d11bb3f901336648fe8a68687122ed755b91694139de7ce08d072fcf165346cda22c8508b474f8e0a06922410ca
-
SSDEEP
1536:YksOAjYPSwUWZzOHohyayRLmb41IDzWOOsg67cO30mNld0+:pJPqpqbb41ACs6O30z+
Malware Config
Extracted
xworm
127.0.0.1:7569
names-pregnant.gl.at.ply.gg:7569
-
Install_directory
%AppData%
-
install_file
svchhost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule sample family_xworm -
Xworm family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33bb90f9b3da549cfa9b056caf986cc0_NeikiAnalytics.exe
Files
-
33bb90f9b3da549cfa9b056caf986cc0_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ