General

  • Target

    c98189fd53d9844b044ae7a0ffb44550_NeikiAnalytics

  • Size

    409KB

  • Sample

    240510-my1tcsac51

  • MD5

    c98189fd53d9844b044ae7a0ffb44550

  • SHA1

    8d105aee7085a7a775c3c3c1fee72b8c4ae4a51a

  • SHA256

    0a8a032701e715c514d3d6bea55c1e738c2c137473a011922d88fe70c95186a0

  • SHA512

    ddd868b3b643ccc02ef4cee58270722494f34ac8a88cb201c3bd72f22a72f8d58f908e1cbde51b5779026c06e77e04e5ed34de0be85dbd7f11ebbb3787b4ce82

  • SSDEEP

    6144:5FQp0yN90QEbYpi67YD/iyjS+iKHiMGoV2I1Vz4pfsBLIzzb5hMa266AyT5:Fy905YpZ7+id+xHYI1Vz40BsznMPAQ5

Malware Config

Targets

    • Target

      c98189fd53d9844b044ae7a0ffb44550_NeikiAnalytics

    • Size

      409KB

    • MD5

      c98189fd53d9844b044ae7a0ffb44550

    • SHA1

      8d105aee7085a7a775c3c3c1fee72b8c4ae4a51a

    • SHA256

      0a8a032701e715c514d3d6bea55c1e738c2c137473a011922d88fe70c95186a0

    • SHA512

      ddd868b3b643ccc02ef4cee58270722494f34ac8a88cb201c3bd72f22a72f8d58f908e1cbde51b5779026c06e77e04e5ed34de0be85dbd7f11ebbb3787b4ce82

    • SSDEEP

      6144:5FQp0yN90QEbYpi67YD/iyjS+iKHiMGoV2I1Vz4pfsBLIzzb5hMa266AyT5:Fy905YpZ7+id+xHYI1Vz40BsznMPAQ5

    • Detect ZGRat V1

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks