General

  • Target

    2e0c168fac3424df64f7b4c903186e30_NeikiAnalytics

  • Size

    409KB

  • Sample

    240510-ave19sbc87

  • MD5

    2e0c168fac3424df64f7b4c903186e30

  • SHA1

    fec9420504cebdfde3f5461cfc22480339fdd72d

  • SHA256

    9827969e15e37406c99f7f3d3c17592a1a445d1698047305cd02cf0b7761b719

  • SHA512

    f2af31458cbf5c2c8c98cd08e0e3fc22a14b5ad164e66225766ad6dd37171688c9a21c2caba4a94733b0a5e764edd3f71abfd1da76cb57ca7adc73daed613f01

  • SSDEEP

    6144:XFBp0yN90QEhKvztxJCNAiTlpgqDL9KI1VzgpfsDLIzzb5hMa266Xa47D:2y907KvzNiTmI1VzQ0DsznMPXaaD

Malware Config

Targets

    • Target

      2e0c168fac3424df64f7b4c903186e30_NeikiAnalytics

    • Size

      409KB

    • MD5

      2e0c168fac3424df64f7b4c903186e30

    • SHA1

      fec9420504cebdfde3f5461cfc22480339fdd72d

    • SHA256

      9827969e15e37406c99f7f3d3c17592a1a445d1698047305cd02cf0b7761b719

    • SHA512

      f2af31458cbf5c2c8c98cd08e0e3fc22a14b5ad164e66225766ad6dd37171688c9a21c2caba4a94733b0a5e764edd3f71abfd1da76cb57ca7adc73daed613f01

    • SSDEEP

      6144:XFBp0yN90QEhKvztxJCNAiTlpgqDL9KI1VzgpfsDLIzzb5hMa266Xa47D:2y907KvzNiTmI1VzQ0DsznMPXaaD

    • Detect ZGRat V1

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks