General
-
Target
2e0c168fac3424df64f7b4c903186e30_NeikiAnalytics
-
Size
409KB
-
Sample
240510-ave19sbc87
-
MD5
2e0c168fac3424df64f7b4c903186e30
-
SHA1
fec9420504cebdfde3f5461cfc22480339fdd72d
-
SHA256
9827969e15e37406c99f7f3d3c17592a1a445d1698047305cd02cf0b7761b719
-
SHA512
f2af31458cbf5c2c8c98cd08e0e3fc22a14b5ad164e66225766ad6dd37171688c9a21c2caba4a94733b0a5e764edd3f71abfd1da76cb57ca7adc73daed613f01
-
SSDEEP
6144:XFBp0yN90QEhKvztxJCNAiTlpgqDL9KI1VzgpfsDLIzzb5hMa266Xa47D:2y907KvzNiTmI1VzQ0DsznMPXaaD
Static task
static1
Behavioral task
behavioral1
Sample
2e0c168fac3424df64f7b4c903186e30_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2e0c168fac3424df64f7b4c903186e30_NeikiAnalytics
-
Size
409KB
-
MD5
2e0c168fac3424df64f7b4c903186e30
-
SHA1
fec9420504cebdfde3f5461cfc22480339fdd72d
-
SHA256
9827969e15e37406c99f7f3d3c17592a1a445d1698047305cd02cf0b7761b719
-
SHA512
f2af31458cbf5c2c8c98cd08e0e3fc22a14b5ad164e66225766ad6dd37171688c9a21c2caba4a94733b0a5e764edd3f71abfd1da76cb57ca7adc73daed613f01
-
SSDEEP
6144:XFBp0yN90QEhKvztxJCNAiTlpgqDL9KI1VzgpfsDLIzzb5hMa266Xa47D:2y907KvzNiTmI1VzQ0DsznMPXaaD
-
Detect ZGRat V1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1