General

  • Target

    c72b51e9396e3560ee77227b3aca58e0_NeikiAnalytics

  • Size

    307KB

  • Sample

    240514-p2p75sgc66

  • MD5

    c72b51e9396e3560ee77227b3aca58e0

  • SHA1

    5ed660f289156d0296490b4e42c94471db7f4330

  • SHA256

    6e6113efb8d2ac46560561b1454f78d94894792d369632b1f2dbc3b0123aa683

  • SHA512

    0f3769f9ac64ff3652e2630f1540d59cf70cab2c5624f017a09517895534254a018f6f978220e0888d5590aa8b811fa4f1520fc4860d7572e06e98b11b146ad0

  • SSDEEP

    6144:KBy+bnr+Lp0yN90QEc5F5OYc1u31g4TByPdRnh1leJxPyRy327:bMr3y90axc1u31TTEfnh6yd7

Malware Config

Extracted

Family

redline

Botnet

morty

C2

217.196.96.101:4132

Attributes
  • auth_value

    fe1a24c211cc8e5bf9ff11c737ce0e97

Targets

    • Target

      c72b51e9396e3560ee77227b3aca58e0_NeikiAnalytics

    • Size

      307KB

    • MD5

      c72b51e9396e3560ee77227b3aca58e0

    • SHA1

      5ed660f289156d0296490b4e42c94471db7f4330

    • SHA256

      6e6113efb8d2ac46560561b1454f78d94894792d369632b1f2dbc3b0123aa683

    • SHA512

      0f3769f9ac64ff3652e2630f1540d59cf70cab2c5624f017a09517895534254a018f6f978220e0888d5590aa8b811fa4f1520fc4860d7572e06e98b11b146ad0

    • SSDEEP

      6144:KBy+bnr+Lp0yN90QEc5F5OYc1u31g4TByPdRnh1leJxPyRy327:bMr3y90axc1u31TTEfnh6yd7

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks