Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 12:56
Static task
static1
Behavioral task
behavioral1
Sample
e75553603f2b4895a75a340aaaa70840_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e75553603f2b4895a75a340aaaa70840_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e75553603f2b4895a75a340aaaa70840_NeikiAnalytics.exe
-
Size
459KB
-
MD5
e75553603f2b4895a75a340aaaa70840
-
SHA1
1cd629840a11d5d03a4e9da7ff9cfcdff773f377
-
SHA256
05ffc155188b8e442a3c158c623001cf63c50758d6c0108f99beb17cb4eea2b8
-
SHA512
b689d1393a8ac39acea3280f8105fca56f9bc01d9ec9f8d7bcb97b2c63d9edf259856244c3730677525f5eada9ac66f17091584a12598463dbed39d44dde0000
-
SSDEEP
12288:xaiKQfPn+GEmc3Cu4nmR66JlZ4yNPURUFGkb:xzKQfP+3mECusmYM5NPCUFGK
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral1/memory/2552-5-0x0000000002460000-0x000000000249C000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-6-0x00000000024A0000-0x00000000024DA000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-7-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-10-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-8-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-12-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-14-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-35-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-32-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-30-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-28-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-26-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-24-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-22-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-20-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-18-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-16-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-56-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-70-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-68-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-66-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-64-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-62-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-60-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-58-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-54-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-52-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-50-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-48-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-46-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-44-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-42-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-40-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-38-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 behavioral1/memory/2552-36-0x00000000024A0000-0x00000000024D5000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2552-5-0x0000000002460000-0x000000000249C000-memory.dmp family_redline behavioral1/memory/2552-6-0x00000000024A0000-0x00000000024DA000-memory.dmp family_redline behavioral1/memory/2552-7-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-10-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-8-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-12-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-14-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-35-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-32-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-30-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-28-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-26-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-24-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-22-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-20-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-18-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-16-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-56-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-70-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-68-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-66-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-64-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-62-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-60-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-58-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-54-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-52-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-50-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-48-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-46-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-44-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-42-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-40-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-38-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline behavioral1/memory/2552-36-0x00000000024A0000-0x00000000024D5000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2552 e75553603f2b4895a75a340aaaa70840_NeikiAnalytics.exe