Threat Database Adware Adware.Neoreklami.DA

Adware.Neoreklami.DA

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 6,054
Threat Level: 20 % (Normal)
Infected Computers: 267
First Seen: October 4, 2018
Last Seen: April 15, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Adware.Neoreklami.DA
Signature status: No Signature

Known Samples

MD5: 2f7ad80e18bb70894d35bb5333728507
SHA1: 7f8799cc03cb69d3d4f627a064d3a669503d0b20
SHA256: A416A99D85DA1328114B0DB9A5DA9D73FA15BC74DA608F95FBC63C0711491C95
File Size: 6.99 MB, 6986240 bytes
MD5: 2d7df10e5ea7f676b1679f7205c06090
SHA1: cc4c29284278e6c339284fb713f73b1f0b764785
SHA256: 6C0371391FDA7372C72070810CE83F26B00471995177A08014D4220780361F5F
File Size: 7.06 MB, 7058944 bytes
MD5: 4bf0ba68d3d6d27dca0ee72ca43cfe4f
SHA1: b0a58df0a91cf5377d8235e89d75d5b0b4b819c2
SHA256: 1CD1C011CF504F60893F96026C273A566B541ABA0FB949FD89755A4834110E82
File Size: 7.06 MB, 7058944 bytes
MD5: 4c8a664c801a21305270c720ad8236c4
SHA1: bcdceb539dbb625033a7b367c68d713b4ba80048
SHA256: 243C9AD8B745495C75AE3A31279500F35041A884F4D2DC3A63006C5EC3FA99D5
File Size: 7.06 MB, 7058944 bytes
MD5: f8a5055039b97ba05007c7d21dd68724
SHA1: 689a549ef3fb1d54993e11dc76cefebd7186bb84
SHA256: A417F171433106695B6BF521B9171D1EC4BDFF768848E4FC3C18B3298F9B49C6
File Size: 7.06 MB, 7058944 bytes
Show More
MD5: 640d76853056aa9554318b64515cde82
SHA1: 12dae257652bd9c9cbe59b6ba529b9ebc131298e
SHA256: 000260D9D80934F244F49CB1F0C3FCD7EC0F773C1482C34DFF33FF4476B6DBCB
File Size: 7.06 MB, 7058944 bytes
MD5: c620a504406ec257d219b02c0550b104
SHA1: e319696d1ffdd1ff5b8ac8cf301649ad5b908593
SHA256: E295A9D193580F3C4B01A771A3D289B76EF378D3EFEF6D4C71E469C79D14F9C3
File Size: 7.14 MB, 7143424 bytes
MD5: 05e859b279513f4c4b4c406a5772c192
SHA1: 9aff9637c9ace2338b6256d7d6475d0d48c604c2
SHA256: FF6F02B3A6939F009AE646B0C2205B00D4809FF568F3C7B6AF3E257FE97009A7
File Size: 7.06 MB, 7058944 bytes
MD5: 29f90c3ba0517d7d3763046826782381
SHA1: ab75c3725432ca2bbd8c44b948a4c9fee1e08c2c
SHA256: 93041522BFAE98A00188D168F942BC77BE74F1428500BAE6C885736B87F6703F
File Size: 7.05 MB, 7045120 bytes
MD5: e76119139ed2c8dbc67391c0ac431034
SHA1: 0f33d77d13df4ebd0d0349d917e6a731d6a96f54
SHA256: EB0056026BC9CB18F9CF8FDDAD5B75C2BBA56454E51595082A97C31547D55BEF
File Size: 7.04 MB, 7037952 bytes
MD5: a1ed0f5fafac5dd3b5375c93bb2456c7
SHA1: 7042de8accc3061265f4c15d2c6a22bccdff9a15
SHA256: A256505E799C222B4A576A87EBF8F767E8C6988B127DF0AD8FF016855D156D97
File Size: 7.04 MB, 7037952 bytes
MD5: 6c4ee5334405ee8de7731f7a3787c4f2
SHA1: fe450c4f5cabc08d7b0a4630dbaefa1eb5579b1e
SHA256: 85E7C0FC238197CA47298089D57AAA5EFC9BFB1843B2F14909CECD8035C132FD
File Size: 6.96 MB, 6961664 bytes
MD5: 0665cfa445fd6ddbd9e7a909f3f038d6
SHA1: 5e1fa67707be5e68fe1aacebeaf41dab2f4cb44d
SHA256: BDCCF803D18F869C8CBC425FBE396C647C463953F5D82EE2E0D1B71385C10602
File Size: 6.63 MB, 6629376 bytes
MD5: f878f8484e9a973f0ec893130eb43c57
SHA1: f9b447f353473c3a0aebb99c961482bfe237a9aa
SHA256: 6E83FB054D600868C36D5D93FA87E2536CAE96A7EB298876C2133E00D51C078F
File Size: 6.67 MB, 6668288 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • dll
  • HighEntropy
  • No Version Info
  • VirtualQueryEx
  • x86

Block Information

Total Blocks: 5,050
Potentially Malicious Blocks: 1,037
Whitelisted Blocks: 2,841
Unknown Blocks: 1,172

Visual Map

0 0 0 1 0 0 0 0 0 0 0 0 ? 0 ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? 0 ? x ? ? ? ? ? ? 0 0 ? 0 ? ? ? 0 ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 ? ? ? ? ? 0 0 ? ? ? ? 0 x ? 0 x ? ? 0 ? x 0 ? 0 x ? ? ? ? ? x ? ? ? ? 0 ? 0 ? ? ? 0 ? ? 0 ? ? ? ? ? ? 0 ? 0 ? 0 ? ? ? ? ? 0 0 ? 0 0 0 0 0 0 x x x ? ? ? ? 0 ? ? x ? ? ? x x ? x x ? x x ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 x x 0 0 0 0 0 0 0 0 x 0 x x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x 0 0 0 ? 0 ? ? 0 0 0 ? 0 ? ? 0 ? ? 0 ? ? ? 0 0 0 ? ? 0 ? ? x ? 0 ? 0 ? ? 0 ? ? 0 0 0 ? 0 0 ? 0 0 ? ? ? ? ? 0 0 ? ? x ? ? x 0 0 0 0 ? 0 ? ? 0 ? ? ? 0 ? ? 0 ? 0 0 0 ? ? 0 ? 0 0 ? 0 ? ? ? ? ? ? ? 0 ? ? 0 ? 0 ? ? ? ? ? ? x ? ? 0 ? 0 0 ? ? 0 ? 0 ? ? ? 0 0 ? ? 0 ? 0 ? 0 ? x ? x ? 0 ? ? 0 ? ? 0 ? ? 0 ? ? 0 ? ? 0 ? ? 0 ? ? 0 ? ? 0 ? 0 ? 0 ? ? ? ? ? ? 0 ? ? ? 0 ? ? ? ? x ? 0 ? ? x 0 ? 0 ? ? ? 0 0 0 0 0 0 0 x 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 0 0 0 0 x ? 0 x 0 0 0 x ? ? ? ? ? 0 ? ? x ? x 0 0 x ? x ? x ? x ? ? x x 0 ? ? 0 ? 0 ? x x ? 0 x x x x ? ? 0 x 0 ? x ? ? 0 0 ? 0 x 0 0 ? 0 ? 0 0 0 ? 0 ? 0 0 ? 0 0 ? ? 0 x x 0 x ? x ? x x x ? ? x x 0 x 0 0 x 0 0 ? ? ? x x x 0 x x x x 0 x x ? x x x x x x x ? x ? x x x ? x x ? x x x x ? ? x ? ? 0 ? ? ? ? 0 0 ? 0 ? x x x ? ? x 0 ? 0 ? x x x ? ? x x ? ? ? x ? x 0 0 0 0 0 0 ? x ? x ? ? x ? ? x x x x x x ? ? x ? ? ? ? ? x ? x ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x 0 0 x x x 0 0 0 x x ? 0 0 ? ? ? ? ? ? x ? ? ? ? 0 ? ? 0 ? ? ? 0 ? 0 ? x x ? ? 0 ? 0 ? ? ? 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 2 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 2 3 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 1 0 1 0 0 2 2 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? x ? ? ? ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? 0 ? ? ? ? ? 0 ? ? ? ? ? ? 0 ? ? 0 ? ? ? ? ? ? ? ? ? 0 ? ? ? ? 0 ? ? ? ? 0 ? ? x 0 ? ? 0 1 0 0 1 1 0 ? 0 1 0 0 0 0 0 x 0 0 0 0 0 0 x 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 x x 0 x 0 x 0 0 0 x x 0 0 x 0 0 0 0 0 x 0 0 0 0 0 x x x x 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 x 0 0 0 x 0 0 x 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 1 0 x x x 0 1 0 0 x 0 x x ? ? 0 0 0 x 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 1 0 0 1 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x 0 0 0 0 x 0 1 x ? ? ? 0 x 0 x 0 0 0 0 0 0 ? 0 x ? x 0 x ? x x x x x x x x 0 0 ? ? ? 0 ? ? x ? ? ? ? x ? ? x ? ? ? ? x ? x ? ? 0 ? 0 0 0 0 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? x x ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? x x ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? 0 ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? x ? ? ? ? ? 0 ? 0 ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 0 0 0 0 0 0 x 0 x 0 0 ? ? 0 0 0 0 0 0 0 0 x 0 0 0 x x x x x x x 0 x x 0 0 0 0 0 0 ? x ? ? ? ? ? 0 0 ? x x ? x x ? x ? ? 0 x ? ? x ? ? ? x ? ? x ? x ? ? x ? ? ? x 0 ? x x 0 x ? x x x x 0 x ? x 0 x x ? x x ? ? 0 0 x x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x x x x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 x x x x x 0 0 0 x 0 0 x 0 0 0 0 x 0 0 x 0 0 0 x 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 ? ? ? x x x x x x x ? 0 x ? x x x x x ? x 0 x 0 x 0 x x x x x x 0 0 x x x x 0 x 0 0 x 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 x x ? x ? ? x
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Neoreklami.DA

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\5e1fa67707be5e68fe1aacebeaf41dab2f4cb44d_0006629376.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\f9b447f353473c3a0aebb99c961482bfe237a9aa_0006668288.,LiQMAxHB

Trending

Most Viewed

Loading...