General
-
Target
15af2dc825a983bccd01fc6a43226810_NeikiAnalytics
-
Size
694KB
-
Sample
240509-2r3rpsee25
-
MD5
15af2dc825a983bccd01fc6a43226810
-
SHA1
4785010bc357c06fd4bd0402dd5b5d205dedab32
-
SHA256
0f08729e15fe0369d56d293f705e27bdf8ef095b2d7fd36c7c852f9a61b86c00
-
SHA512
04f22b3474497919d034096f4930b451cfb23cd218579e8b3514af345b4f360c3f49784218416c3ee58d06d029b4cff46b088dd68bfecf1b31fc214a8ad75498
-
SSDEEP
12288:Gy90SEzldUgrwhFTxp8onXRlMoKWR6F918byKMA+oEM9+L:GyVEzldnKFf8kXbMo96F918byrLqM
Static task
static1
Behavioral task
behavioral1
Sample
15af2dc825a983bccd01fc6a43226810_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
15af2dc825a983bccd01fc6a43226810_NeikiAnalytics
-
Size
694KB
-
MD5
15af2dc825a983bccd01fc6a43226810
-
SHA1
4785010bc357c06fd4bd0402dd5b5d205dedab32
-
SHA256
0f08729e15fe0369d56d293f705e27bdf8ef095b2d7fd36c7c852f9a61b86c00
-
SHA512
04f22b3474497919d034096f4930b451cfb23cd218579e8b3514af345b4f360c3f49784218416c3ee58d06d029b4cff46b088dd68bfecf1b31fc214a8ad75498
-
SSDEEP
12288:Gy90SEzldUgrwhFTxp8onXRlMoKWR6F918byKMA+oEM9+L:GyVEzldnKFf8kXbMo96F918byrLqM
-
Detect ZGRat V1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1