General
-
Target
7903417a4425e5f819fdca4ddb5a4ae0_NeikiAnalytics
-
Size
479KB
-
Sample
240512-hh6x8adc5v
-
MD5
7903417a4425e5f819fdca4ddb5a4ae0
-
SHA1
42be90bb5600574abb0b37113b65b32d6388b7ff
-
SHA256
aee53fccee33b73dab9491356e6eb50d71b3b380ca589b649b6ec63ff792c3da
-
SHA512
11fff0808094ce693e9af5c1f3544f8efad57f5014959329a41d5d76ff92f9be45a3963b9307cfa829694d743f86b1c56f342b38f4f52d5f602339e5bca05fbf
-
SSDEEP
12288:qMrSy90q5EwvocAm820Gfl6pleAG/R/7hhVecnO:syMuocdMy8Hel/R/7hJO
Static task
static1
Behavioral task
behavioral1
Sample
7903417a4425e5f819fdca4ddb5a4ae0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Targets
-
-
Target
7903417a4425e5f819fdca4ddb5a4ae0_NeikiAnalytics
-
Size
479KB
-
MD5
7903417a4425e5f819fdca4ddb5a4ae0
-
SHA1
42be90bb5600574abb0b37113b65b32d6388b7ff
-
SHA256
aee53fccee33b73dab9491356e6eb50d71b3b380ca589b649b6ec63ff792c3da
-
SHA512
11fff0808094ce693e9af5c1f3544f8efad57f5014959329a41d5d76ff92f9be45a3963b9307cfa829694d743f86b1c56f342b38f4f52d5f602339e5bca05fbf
-
SSDEEP
12288:qMrSy90q5EwvocAm820Gfl6pleAG/R/7hhVecnO:syMuocdMy8Hel/R/7hJO
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1