General
-
Target
11c55b1632caaf8bb0a82eae4dc4c380_NEIKI
-
Size
706KB
-
Sample
240508-jgsjwacc36
-
MD5
11c55b1632caaf8bb0a82eae4dc4c380
-
SHA1
d0bf9dd3af21747c804585065121f2b3744a8000
-
SHA256
068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5
-
SHA512
4f249aa4d4465626620838fd57a14ab3d591a543939cb50bc201f8090d1070e84d1beda80d40a7d3e0e2b7697b6616a4df63276d74de319e690c7e49fa0391a2
-
SSDEEP
12288:Ty90uyoUzvFTocxDeXjWZr2xu+ZmNsOZZslGqgtigrKiURO96wOaLQHmJG3:Tym35VxDeyZrrsRgtTURSpLQl3
Static task
static1
Behavioral task
behavioral1
Sample
11c55b1632caaf8bb0a82eae4dc4c380_NEIKI.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
11c55b1632caaf8bb0a82eae4dc4c380_NEIKI
-
Size
706KB
-
MD5
11c55b1632caaf8bb0a82eae4dc4c380
-
SHA1
d0bf9dd3af21747c804585065121f2b3744a8000
-
SHA256
068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5
-
SHA512
4f249aa4d4465626620838fd57a14ab3d591a543939cb50bc201f8090d1070e84d1beda80d40a7d3e0e2b7697b6616a4df63276d74de319e690c7e49fa0391a2
-
SSDEEP
12288:Ty90uyoUzvFTocxDeXjWZr2xu+ZmNsOZZslGqgtigrKiURO96wOaLQHmJG3:Tym35VxDeyZrrsRgtTURSpLQl3
-
Detect ZGRat V1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1