General
-
Target
d88b40ed7f2e8b7e39cd1c21d09bde00_NeikiAnalytics
-
Size
501KB
-
Sample
240515-sv9vrafh78
-
MD5
d88b40ed7f2e8b7e39cd1c21d09bde00
-
SHA1
d9865029f441f1234580ec18756566b6fe201331
-
SHA256
044041766e3684b106c4c78a70188a599578f3768457e25d26e0c24fb5a34149
-
SHA512
c22374565af7f8455c985d70d3d9f5af69f1480fbf2fd02a3ff44e2fe5c9661e0d61814d48f9c3398ddad3de01872a255f23757a30deef34fbadcb8ebbd43c9d
-
SSDEEP
12288:JYFBqcQcaQVsGRi5xYJQgP4FiKe37a8oz9NSQ1f:JYXqc3sCi5XY4FiKeLPozvx
Static task
static1
Behavioral task
behavioral1
Sample
d88b40ed7f2e8b7e39cd1c21d09bde00_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d88b40ed7f2e8b7e39cd1c21d09bde00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.96:28380
Targets
-
-
Target
d88b40ed7f2e8b7e39cd1c21d09bde00_NeikiAnalytics
-
Size
501KB
-
MD5
d88b40ed7f2e8b7e39cd1c21d09bde00
-
SHA1
d9865029f441f1234580ec18756566b6fe201331
-
SHA256
044041766e3684b106c4c78a70188a599578f3768457e25d26e0c24fb5a34149
-
SHA512
c22374565af7f8455c985d70d3d9f5af69f1480fbf2fd02a3ff44e2fe5c9661e0d61814d48f9c3398ddad3de01872a255f23757a30deef34fbadcb8ebbd43c9d
-
SSDEEP
12288:JYFBqcQcaQVsGRi5xYJQgP4FiKe37a8oz9NSQ1f:JYXqc3sCi5XY4FiKeLPozvx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Suspicious use of SetThreadContext
-