Malware Analysis Report

2025-03-15 04:40

Sample ID 240516-n8hafabe9y
Target ddbbb75398f66921b730a2c595addae0_NeikiAnalytics
SHA256 2480a35eb8d02b3ceb4d7195c81e5d2b671ef2bac5ac01ff48081edb08f54923
Tags
redline infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2480a35eb8d02b3ceb4d7195c81e5d2b671ef2bac5ac01ff48081edb08f54923

Threat Level: Known bad

The file ddbbb75398f66921b730a2c595addae0_NeikiAnalytics was found to be: Known bad.

Malicious Activity Summary

redline infostealer

RedLine

RedLine payload

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-16 12:03

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-16 12:03

Reported

2024-05-16 12:06

Platform

win7-20240221-en

Max time kernel

140s

Max time network

141s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ddbbb75398f66921b730a2c595addae0_NeikiAnalytics.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ddbbb75398f66921b730a2c595addae0_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ddbbb75398f66921b730a2c595addae0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\ddbbb75398f66921b730a2c595addae0_NeikiAnalytics.exe"

Network

Country Destination Domain Proto
RU 185.161.248.143:38452 tcp
RU 185.161.248.143:38452 tcp
RU 185.161.248.143:38452 tcp
RU 185.161.248.143:38452 tcp
RU 185.161.248.143:38452 tcp
RU 185.161.248.143:38452 tcp
RU 185.161.248.143:38452 tcp

Files

memory/1888-2-0x0000000002BB0000-0x0000000002BF6000-memory.dmp

memory/1888-1-0x0000000000230000-0x0000000000330000-memory.dmp

memory/1888-3-0x0000000000400000-0x0000000000449000-memory.dmp

memory/1888-4-0x0000000004870000-0x00000000048AC000-memory.dmp

memory/1888-5-0x0000000006E80000-0x0000000006EBA000-memory.dmp

memory/1888-6-0x0000000000400000-0x0000000002BB0000-memory.dmp

memory/1888-7-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-8-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-10-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-12-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-14-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-22-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-66-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-70-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-68-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-64-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-62-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-60-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-58-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-56-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-54-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-52-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-51-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-48-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-46-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-44-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-42-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-40-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-38-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-36-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-34-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-32-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-30-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-28-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-26-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-24-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-20-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-18-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-17-0x0000000006E80000-0x0000000006EB5000-memory.dmp

memory/1888-800-0x0000000000230000-0x0000000000330000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-16 12:03

Reported

2024-05-16 12:06

Platform

win10v2004-20240508-en

Max time kernel

145s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ddbbb75398f66921b730a2c595addae0_NeikiAnalytics.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ddbbb75398f66921b730a2c595addae0_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ddbbb75398f66921b730a2c595addae0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\ddbbb75398f66921b730a2c595addae0_NeikiAnalytics.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
RU 185.161.248.143:38452 tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
NL 23.62.61.138:443 www.bing.com tcp
US 8.8.8.8:53 138.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
RU 185.161.248.143:38452 tcp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 101.58.20.217.in-addr.arpa udp
RU 185.161.248.143:38452 tcp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
RU 185.161.248.143:38452 tcp
RU 185.161.248.143:38452 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
RU 185.161.248.143:38452 tcp
RU 185.161.248.143:38452 tcp

Files

memory/3500-1-0x0000000002F20000-0x0000000003020000-memory.dmp

memory/3500-2-0x0000000002E40000-0x0000000002E86000-memory.dmp

memory/3500-3-0x0000000000400000-0x0000000000449000-memory.dmp

memory/3500-4-0x00000000071E0000-0x000000000721C000-memory.dmp

memory/3500-5-0x0000000000400000-0x0000000002BB0000-memory.dmp

memory/3500-6-0x00000000072D0000-0x0000000007874000-memory.dmp

memory/3500-7-0x0000000007280000-0x00000000072BA000-memory.dmp

memory/3500-61-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-43-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-71-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-69-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-67-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-65-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-63-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-59-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-57-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-55-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-53-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-51-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-49-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-47-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-45-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-41-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-801-0x000000000A430000-0x000000000A442000-memory.dmp

memory/3500-802-0x000000000A450000-0x000000000A55A000-memory.dmp

memory/3500-800-0x0000000009D70000-0x000000000A388000-memory.dmp

memory/3500-39-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-38-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-35-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-33-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-803-0x000000000A570000-0x000000000A5AC000-memory.dmp

memory/3500-31-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-29-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-27-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-25-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-804-0x0000000004CC0000-0x0000000004D0C000-memory.dmp

memory/3500-23-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-21-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-19-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-17-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-15-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-13-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-11-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-9-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-8-0x0000000007280000-0x00000000072B5000-memory.dmp

memory/3500-806-0x0000000002F20000-0x0000000003020000-memory.dmp

memory/3500-807-0x0000000000400000-0x0000000000449000-memory.dmp