General
-
Target
73d68c52c799495637a7ea3b3b4a9b20_NEIKI
-
Size
1.1MB
-
Sample
240508-m359mshb2x
-
MD5
73d68c52c799495637a7ea3b3b4a9b20
-
SHA1
18f886fb80bf064caeb4b135d52740ecdba6b1ee
-
SHA256
0655d16e9a5566cd065f65ab31cab51ac2dea2c4201b967bf4438fe8c7d75e8a
-
SHA512
02f2eb77559863b2f9149492063bc022ed5dbca6c0cb38532dd395bb5579adbd41293494831c048d7aa9c439006fd52e9c55ec370b9c12cfba0c94219b609a1d
-
SSDEEP
24576:6yjnsO3+2f1tMMHM+WUHtmtkE3bZPPToxYTscRh556zsyC6:BrsO3+2f1txJTmtJZPPToKTzRU9C
Static task
static1
Behavioral task
behavioral1
Sample
73d68c52c799495637a7ea3b3b4a9b20_NEIKI.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
amadey
3.80
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Targets
-
-
Target
73d68c52c799495637a7ea3b3b4a9b20_NEIKI
-
Size
1.1MB
-
MD5
73d68c52c799495637a7ea3b3b4a9b20
-
SHA1
18f886fb80bf064caeb4b135d52740ecdba6b1ee
-
SHA256
0655d16e9a5566cd065f65ab31cab51ac2dea2c4201b967bf4438fe8c7d75e8a
-
SHA512
02f2eb77559863b2f9149492063bc022ed5dbca6c0cb38532dd395bb5579adbd41293494831c048d7aa9c439006fd52e9c55ec370b9c12cfba0c94219b609a1d
-
SSDEEP
24576:6yjnsO3+2f1tMMHM+WUHtmtkE3bZPPToxYTscRh556zsyC6:BrsO3+2f1txJTmtJZPPToKTzRU9C
-
Detect ZGRat V1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1