General
-
Target
06cc922bbf2a4da7d68c682c7111ea00_NeikiAnalytics
-
Size
479KB
-
Sample
240510-r9qvrabe5t
-
MD5
06cc922bbf2a4da7d68c682c7111ea00
-
SHA1
01c61c8bd76b8a2e939b4f24d40674d5692a0634
-
SHA256
33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906
-
SHA512
c0cd35bc30ee1171d60a74444a0cb12db66a2e1c5034f4c6565eaaf0619931053a1afa74a37cdadbd39c995f36b258849c486a6983896eb678daab046dcb9622
-
SSDEEP
6144:K5y+bnr+Vp0yN90QEBVXjr+vQkofbHDUShI811MPZPP9jKONDhFHwjqekrkGL:HMrRy90lzSLEHDFIQ1iP95DXgqbrky
Static task
static1
Behavioral task
behavioral1
Sample
06cc922bbf2a4da7d68c682c7111ea00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Targets
-
-
Target
06cc922bbf2a4da7d68c682c7111ea00_NeikiAnalytics
-
Size
479KB
-
MD5
06cc922bbf2a4da7d68c682c7111ea00
-
SHA1
01c61c8bd76b8a2e939b4f24d40674d5692a0634
-
SHA256
33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906
-
SHA512
c0cd35bc30ee1171d60a74444a0cb12db66a2e1c5034f4c6565eaaf0619931053a1afa74a37cdadbd39c995f36b258849c486a6983896eb678daab046dcb9622
-
SSDEEP
6144:K5y+bnr+Vp0yN90QEBVXjr+vQkofbHDUShI811MPZPP9jKONDhFHwjqekrkGL:HMrRy90lzSLEHDFIQ1iP95DXgqbrky
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1