d:\WORK\DRIVERS\DEV\ReleaseUnicode\OMETH.pdb
Static task
static1
Behavioral task
behavioral1
Sample
049fab56596943cea642a4bcf3febb303931185ab2e8632d2cf64cdbdabdc03a_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
049fab56596943cea642a4bcf3febb303931185ab2e8632d2cf64cdbdabdc03a_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
049fab56596943cea642a4bcf3febb303931185ab2e8632d2cf64cdbdabdc03a_NeikiAnalytics.exe
-
Size
176KB
-
MD5
b486cd8578def15b2f46d25655910ff0
-
SHA1
2423fc5b288630b4b27731f04c022a1421dc7987
-
SHA256
049fab56596943cea642a4bcf3febb303931185ab2e8632d2cf64cdbdabdc03a
-
SHA512
f6aca1e13feaaabb6f02dac06946c34665f4287a7f54fda5310a3f4f2e88f2b0ba9f9c860b9cff1de426d03f5709c317250920880b876bab8bb57f56be7d8a5a
-
SSDEEP
3072:V2DkNjaKpO9u59ArrLilW7KYo2MjnlwntrJ:2cer3Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 049fab56596943cea642a4bcf3febb303931185ab2e8632d2cf64cdbdabdc03a_NeikiAnalytics.exe
Files
-
049fab56596943cea642a4bcf3febb303931185ab2e8632d2cf64cdbdabdc03a_NeikiAnalytics.exe.dll windows:4 windows x86 arch:x86
696fae81baf4113a4db7012ff89b013f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
gethostname
gethostbyname
inet_ntoa
kernel32
GetStringTypeA
CompareStringW
CompareStringA
FlushFileBuffers
Sleep
CloseHandle
CreateFileA
GetLocaleInfoW
HeapSize
ReadFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetTimeZoneInformation
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
LoadLibraryA
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetLastError
GetCurrentThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
SetEnvironmentVariableA
GetStringTypeW
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
unitcpip
ord30
ord20
ord28
ord5
ord33
ord1
ord27
ord32
unicomm
ord27
ord45
ord40
ord20
ord21
ord12
ord19
ord36
Exports
Exports
?HandInts@@YAXPAUgeneric_port@@@Z
UDrvClose
UDrvCompareAddress
UDrvGetHeaderAddress
UDrvGetType
UDrvOpen
UDrvReadGroupFinish
UDrvReadGroupStart
UDrvValidAddress
UDrvValidAddressEx
UDrvValidHeader
UDrvValidString1
UDrvValidString2
UDrvWriteGroupFinish
UDrvWriteGroupStart
UDrvWriteItemFinish
UDrvWriteItemStart
Sections
.text Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ