General
-
Target
c98189fd53d9844b044ae7a0ffb44550_NeikiAnalytics
-
Size
409KB
-
Sample
240510-my1tcsac51
-
MD5
c98189fd53d9844b044ae7a0ffb44550
-
SHA1
8d105aee7085a7a775c3c3c1fee72b8c4ae4a51a
-
SHA256
0a8a032701e715c514d3d6bea55c1e738c2c137473a011922d88fe70c95186a0
-
SHA512
ddd868b3b643ccc02ef4cee58270722494f34ac8a88cb201c3bd72f22a72f8d58f908e1cbde51b5779026c06e77e04e5ed34de0be85dbd7f11ebbb3787b4ce82
-
SSDEEP
6144:5FQp0yN90QEbYpi67YD/iyjS+iKHiMGoV2I1Vz4pfsBLIzzb5hMa266AyT5:Fy905YpZ7+id+xHYI1Vz40BsznMPAQ5
Static task
static1
Behavioral task
behavioral1
Sample
c98189fd53d9844b044ae7a0ffb44550_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
c98189fd53d9844b044ae7a0ffb44550_NeikiAnalytics
-
Size
409KB
-
MD5
c98189fd53d9844b044ae7a0ffb44550
-
SHA1
8d105aee7085a7a775c3c3c1fee72b8c4ae4a51a
-
SHA256
0a8a032701e715c514d3d6bea55c1e738c2c137473a011922d88fe70c95186a0
-
SHA512
ddd868b3b643ccc02ef4cee58270722494f34ac8a88cb201c3bd72f22a72f8d58f908e1cbde51b5779026c06e77e04e5ed34de0be85dbd7f11ebbb3787b4ce82
-
SSDEEP
6144:5FQp0yN90QEbYpi67YD/iyjS+iKHiMGoV2I1Vz4pfsBLIzzb5hMa266AyT5:Fy905YpZ7+id+xHYI1Vz40BsznMPAQ5
-
Detect ZGRat V1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1