General
-
Target
44088360d2a85b605505472cff282320_NEIKI
-
Size
1.5MB
-
Sample
240508-zc4z4sec51
-
MD5
44088360d2a85b605505472cff282320
-
SHA1
55996324c41a0507205395fe2bd3939c1f69499b
-
SHA256
09d9ead98677cbc6f36f6ee0761fd9957c2c849bd35989990f220cec24f39918
-
SHA512
a69a41fa0267358162d927e89574679e47a41c440fc6c298c197fba1c314ec80bc647be6d9964dc23357054423aad22fda869e0e658f82b6f35ea6d93d074045
-
SSDEEP
24576:eyUQBKaUoqjr16ZSUuxLWNEWE0k8g04mAGm/YpA+AK/zU:tqaUoqn1601xLWNxxkV9mAW
Static task
static1
Behavioral task
behavioral1
Sample
44088360d2a85b605505472cff282320_NEIKI.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Targets
-
-
Target
44088360d2a85b605505472cff282320_NEIKI
-
Size
1.5MB
-
MD5
44088360d2a85b605505472cff282320
-
SHA1
55996324c41a0507205395fe2bd3939c1f69499b
-
SHA256
09d9ead98677cbc6f36f6ee0761fd9957c2c849bd35989990f220cec24f39918
-
SHA512
a69a41fa0267358162d927e89574679e47a41c440fc6c298c197fba1c314ec80bc647be6d9964dc23357054423aad22fda869e0e658f82b6f35ea6d93d074045
-
SSDEEP
24576:eyUQBKaUoqjr16ZSUuxLWNEWE0k8g04mAGm/YpA+AK/zU:tqaUoqn1601xLWNxxkV9mAW
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-