General
-
Target
78acbb31d10ffafb5463d298081c1e80_NeikiAnalytics
-
Size
95KB
-
Sample
240515-eqk4yagg73
-
MD5
78acbb31d10ffafb5463d298081c1e80
-
SHA1
ddb0c1e98c8fe8bc75345bdca2d9470eefd97867
-
SHA256
2164157387e8d50309f170b21cf154667c87d86ea72ae734c69942e8f535a34b
-
SHA512
6d720f7e1be6a822af9d42cdf24c3488f4bc1ce0d2ab3f0775bba403e228688062c7edbe40f8c6b5274b1f2b04f98bc9ee64f889315592db9bc93986ac5932ba
-
SSDEEP
1536:5qs8OqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed273teulgS6p8l:XHuOYj+zi0ZbYe1g0ujyzd38
Behavioral task
behavioral1
Sample
78acbb31d10ffafb5463d298081c1e80_NeikiAnalytics.exe
Resource
win7-20240221-en
Malware Config
Extracted
redline
cheat
192.168.209.130:48371
Targets
-
-
Target
78acbb31d10ffafb5463d298081c1e80_NeikiAnalytics
-
Size
95KB
-
MD5
78acbb31d10ffafb5463d298081c1e80
-
SHA1
ddb0c1e98c8fe8bc75345bdca2d9470eefd97867
-
SHA256
2164157387e8d50309f170b21cf154667c87d86ea72ae734c69942e8f535a34b
-
SHA512
6d720f7e1be6a822af9d42cdf24c3488f4bc1ce0d2ab3f0775bba403e228688062c7edbe40f8c6b5274b1f2b04f98bc9ee64f889315592db9bc93986ac5932ba
-
SSDEEP
1536:5qs8OqJGlbG6jejoigIj43Ywzi0Zb78ivombfexv0ujXyyed273teulgS6p8l:XHuOYj+zi0ZbYe1g0ujyzd38
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-