General
-
Target
c72b51e9396e3560ee77227b3aca58e0_NeikiAnalytics
-
Size
307KB
-
Sample
240514-p2p75sgc66
-
MD5
c72b51e9396e3560ee77227b3aca58e0
-
SHA1
5ed660f289156d0296490b4e42c94471db7f4330
-
SHA256
6e6113efb8d2ac46560561b1454f78d94894792d369632b1f2dbc3b0123aa683
-
SHA512
0f3769f9ac64ff3652e2630f1540d59cf70cab2c5624f017a09517895534254a018f6f978220e0888d5590aa8b811fa4f1520fc4860d7572e06e98b11b146ad0
-
SSDEEP
6144:KBy+bnr+Lp0yN90QEc5F5OYc1u31g4TByPdRnh1leJxPyRy327:bMr3y90axc1u31TTEfnh6yd7
Static task
static1
Behavioral task
behavioral1
Sample
c72b51e9396e3560ee77227b3aca58e0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
redline
morty
217.196.96.101:4132
-
auth_value
fe1a24c211cc8e5bf9ff11c737ce0e97
Targets
-
-
Target
c72b51e9396e3560ee77227b3aca58e0_NeikiAnalytics
-
Size
307KB
-
MD5
c72b51e9396e3560ee77227b3aca58e0
-
SHA1
5ed660f289156d0296490b4e42c94471db7f4330
-
SHA256
6e6113efb8d2ac46560561b1454f78d94894792d369632b1f2dbc3b0123aa683
-
SHA512
0f3769f9ac64ff3652e2630f1540d59cf70cab2c5624f017a09517895534254a018f6f978220e0888d5590aa8b811fa4f1520fc4860d7572e06e98b11b146ad0
-
SSDEEP
6144:KBy+bnr+Lp0yN90QEc5F5OYc1u31g4TByPdRnh1leJxPyRy327:bMr3y90axc1u31TTEfnh6yd7
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1