C:\Users\kali\Documents\GitHub\Revived-Raum\RevivedRaum\Release\Raum_core.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8f226fbeb0e9f4c4adbe8d4de68ac0e43c4c4bdc8a1ebe5bd7f770c1f4ec074c_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8f226fbeb0e9f4c4adbe8d4de68ac0e43c4c4bdc8a1ebe5bd7f770c1f4ec074c_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
8f226fbeb0e9f4c4adbe8d4de68ac0e43c4c4bdc8a1ebe5bd7f770c1f4ec074c_NeikiAnalytics.exe
-
Size
220KB
-
MD5
ab23c98603f6e77b0eee1f979ff800d0
-
SHA1
27b96dfd589f73df41e93439fa782fdb5b00bc13
-
SHA256
8f226fbeb0e9f4c4adbe8d4de68ac0e43c4c4bdc8a1ebe5bd7f770c1f4ec074c
-
SHA512
e6ad3aff858fb4c47b039a78ca332585fac63440975a64cbd4869e44238dc0dc2a71af3ee25ac7fdeabaf3509d5fd1fcd1783488223f93e1935a9897be32db14
-
SSDEEP
3072:MPCSgEQ5iPrzbswmm+f9WrpUl/lyeV+l76wYDJFrWlUnk1o:TEQ8Pvb5GloQWqk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8f226fbeb0e9f4c4adbe8d4de68ac0e43c4c4bdc8a1ebe5bd7f770c1f4ec074c_NeikiAnalytics.exe
Files
-
8f226fbeb0e9f4c4adbe8d4de68ac0e43c4c4bdc8a1ebe5bd7f770c1f4ec074c_NeikiAnalytics.exe.exe windows:5 windows x86 arch:x86
df158a8bf0ec5041ce8dcc4c3f4f44d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
DeleteFileA
GetTickCount
Sleep
CreateFileA
WriteFile
CloseHandle
CreateMutexA
GetLastError
GetModuleFileNameA
WaitForSingleObject
InitializeCriticalSectionAndSpinCount
CreateDirectoryA
SetFileAttributesA
ExitProcess
FindFirstFileA
SetLastError
FindNextFileA
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
GetCurrentProcess
InterlockedDecrement
WideCharToMultiByte
SetEndOfFile
CreateFileW
SetEnvironmentVariableA
ReadConsoleW
WriteConsoleW
SetStdHandle
LoadLibraryW
OutputDebugStringW
SetFilePointer
HeapReAlloc
GetOEMCP
IsValidCodePage
GetACP
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
FlushFileBuffers
SetFilePointerEx
InterlockedIncrement
EncodePointer
DecodePointer
DeleteCriticalSection
MultiByteToWideChar
GetStringTypeW
lstrlenA
LocalFree
HeapFree
GetSystemTimeAsFileTime
IsDebuggerPresent
IsProcessorFeaturePresent
CreateThread
GetCurrentThreadId
ExitThread
GetProcAddress
LoadLibraryExW
GetCommandLineA
RaiseException
RtlUnwind
HeapAlloc
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
AreFileApisANSI
HeapSize
GetProcessHeap
GetFileType
GetConsoleCP
GetConsoleMode
ReadFile
user32
GetCursorPos
ole32
CoInitializeSecurity
CoUninitialize
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
oleaut32
SysAllocString
SysFreeString
VariantClear
ws2_32
socket
gethostbyname
htons
connect
WSAStartup
closesocket
recv
send
WSACleanup
WSAGetLastError
Sections
.text Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ