General

  • Target

    059fbf6b462a01a8fca04d0d69d65b50_NeikiAnalytics.exe

  • Size

    331KB

  • Sample

    240521-x2wnxsff83

  • MD5

    059fbf6b462a01a8fca04d0d69d65b50

  • SHA1

    0f2cda0f26b5c59320cd3b7b5f8185854aa2a3a6

  • SHA256

    65080d9f06f32f7f5e82cf8934b9539e3da557d4a2bef5cb4d3d49bdb7a008ae

  • SHA512

    2849fff789a34e4972d4b893eaeee1a253738b385878267d26babc878c60b9e58ccd01c156b89ab57058f4436f92c529738daa2183eae847c36597fdd3f414d0

  • SSDEEP

    6144:t+g7eMsOFZpTd5MKfnL0kojNZtPOhXxaYe7Ybx3XyWrn6Iq8:iMsOFZp8gsHOhBaDWrn3q8

Malware Config

Extracted

Family

redline

Botnet

5345987420

C2

https://pastebin.com/raw/NgsUAPya

Targets

    • Target

      059fbf6b462a01a8fca04d0d69d65b50_NeikiAnalytics.exe

    • Size

      331KB

    • MD5

      059fbf6b462a01a8fca04d0d69d65b50

    • SHA1

      0f2cda0f26b5c59320cd3b7b5f8185854aa2a3a6

    • SHA256

      65080d9f06f32f7f5e82cf8934b9539e3da557d4a2bef5cb4d3d49bdb7a008ae

    • SHA512

      2849fff789a34e4972d4b893eaeee1a253738b385878267d26babc878c60b9e58ccd01c156b89ab57058f4436f92c529738daa2183eae847c36597fdd3f414d0

    • SSDEEP

      6144:t+g7eMsOFZpTd5MKfnL0kojNZtPOhXxaYe7Ybx3XyWrn6Iq8:iMsOFZp8gsHOhBaDWrn3q8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Command and Control

Web Service

1
T1102

Tasks