General

  • Target

    11c55b1632caaf8bb0a82eae4dc4c380_NEIKI

  • Size

    706KB

  • Sample

    240508-jgsjwacc36

  • MD5

    11c55b1632caaf8bb0a82eae4dc4c380

  • SHA1

    d0bf9dd3af21747c804585065121f2b3744a8000

  • SHA256

    068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5

  • SHA512

    4f249aa4d4465626620838fd57a14ab3d591a543939cb50bc201f8090d1070e84d1beda80d40a7d3e0e2b7697b6616a4df63276d74de319e690c7e49fa0391a2

  • SSDEEP

    12288:Ty90uyoUzvFTocxDeXjWZr2xu+ZmNsOZZslGqgtigrKiURO96wOaLQHmJG3:Tym35VxDeyZrrsRgtTURSpLQl3

Malware Config

Targets

    • Target

      11c55b1632caaf8bb0a82eae4dc4c380_NEIKI

    • Size

      706KB

    • MD5

      11c55b1632caaf8bb0a82eae4dc4c380

    • SHA1

      d0bf9dd3af21747c804585065121f2b3744a8000

    • SHA256

      068eed4a1ed03c8858ef0a5a19b73b620c91b57091784d542d5e9153ab3e79d5

    • SHA512

      4f249aa4d4465626620838fd57a14ab3d591a543939cb50bc201f8090d1070e84d1beda80d40a7d3e0e2b7697b6616a4df63276d74de319e690c7e49fa0391a2

    • SSDEEP

      12288:Ty90uyoUzvFTocxDeXjWZr2xu+ZmNsOZZslGqgtigrKiURO96wOaLQHmJG3:Tym35VxDeyZrrsRgtTURSpLQl3

    • Detect ZGRat V1

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks