Behavioral task
behavioral1
Sample
4c98e0cf622505b41f989fbf37c213b65dc87f4a148ac2c9b7d93e51daeaaf2b_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
4c98e0cf622505b41f989fbf37c213b65dc87f4a148ac2c9b7d93e51daeaaf2b_NeikiAnalytics.exe
-
Size
436KB
-
MD5
454b29b125477c8534af5c43a70c2430
-
SHA1
69c78b3a178da54f4a0137311bd1d550e0e8587e
-
SHA256
4c98e0cf622505b41f989fbf37c213b65dc87f4a148ac2c9b7d93e51daeaaf2b
-
SHA512
2b53219f886641cd17cbd9331bae0522d82910a1e8b7833b4950d45aa635353ec9c984456e199228fcff626d0a4e7c0ad7e02a5205bdf3183ca429f07bc2f4b6
-
SSDEEP
6144:dGdR+Yk/N8duBmG6t+UnRsRCQ/OJZOg70:doR+Y4NSG6oUnRsdOJZOg70
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule sample family_blackmoon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4c98e0cf622505b41f989fbf37c213b65dc87f4a148ac2c9b7d93e51daeaaf2b_NeikiAnalytics.exe
Files
-
4c98e0cf622505b41f989fbf37c213b65dc87f4a148ac2c9b7d93e51daeaaf2b_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 391KB - Virtual size: 390KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE