@@Pform_u@Finalize
@@Pform_u@Initialize
@@Unzipper@Finalize
@@Unzipper@Initialize
__GetExceptDLLinfo
___CPPdebugHook
_mainform
_pForm
Behavioral task
behavioral1
Sample
954f1fa7ea3d7738ed18553b8b544e20_NeikiAnalytics.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
954f1fa7ea3d7738ed18553b8b544e20_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
Target
954f1fa7ea3d7738ed18553b8b544e20_NeikiAnalytics.exe
Size
730KB
MD5
954f1fa7ea3d7738ed18553b8b544e20
SHA1
3789618ddcd083c8dc7b20bb0927403ab87bfbcd
SHA256
11bc29a6964e734d5cb67f44e64306bb6755e888cfe261a30007e1de68716897
SHA512
327167ce2ea8b355194a33f7b9b55087ffd6ee8d3d18cf774f5ade040b39035ff5cec99878b4b3481db7575563908da54ee58bd36bb9e147ac5880810f38d1ce
SSDEEP
12288:B8X5/unEIZUlxOnY7a+DhHiXKNcVIepwnjuVEtyyTR0YsoS:qXNdIKxQX5kTR
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
954f1fa7ea3d7738ed18553b8b544e20_NeikiAnalytics.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
@@Pform_u@Finalize
@@Pform_u@Initialize
@@Unzipper@Finalize
@@Unzipper@Initialize
__GetExceptDLLinfo
___CPPdebugHook
_mainform
_pForm
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE