Behavioral task
behavioral1
Sample
3fd3a75f444058929ae6292627c81640362dabe2df7d25a76c81946a226de220_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3fd3a75f444058929ae6292627c81640362dabe2df7d25a76c81946a226de220_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
3fd3a75f444058929ae6292627c81640362dabe2df7d25a76c81946a226de220_NeikiAnalytics.exe
-
Size
23KB
-
MD5
a72661611c2c32ae2225c1618fb7c3d0
-
SHA1
c717b184fff0a32a900e34d8ce442ba1ba4ff926
-
SHA256
3fd3a75f444058929ae6292627c81640362dabe2df7d25a76c81946a226de220
-
SHA512
ebb3a192eea38c6169b7bc6eb23269303d31dc0323e492f118ce92b0bbd0832c7860ad5473d2a6560e73431e578ed37f5a1da4490053bce10a3d16cb42e77993
-
SSDEEP
384:kwTSiYWD2Z7w3CsJeiecwJ3fw6FgzeAh33RtmRvR6JZlbw8hqIusZzZFvA:rvZiBK1edJRpcnuqI
Malware Config
Extracted
njrat
0.7d
HacKed
asdaryder.duckdns.org:5552
93a9e7c038454dbd9f3d62e55ea7bceb
-
reg_key
93a9e7c038454dbd9f3d62e55ea7bceb
-
splitter
|'|'|
Signatures
-
Njrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3fd3a75f444058929ae6292627c81640362dabe2df7d25a76c81946a226de220_NeikiAnalytics.exe
Files
-
3fd3a75f444058929ae6292627c81640362dabe2df7d25a76c81946a226de220_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ