General
-
Target
0a62172ecf9e400da1d1e36aec9ad750_NeikiAnalytics.exe
-
Size
539KB
-
Sample
240525-ghzngagd4y
-
MD5
0a62172ecf9e400da1d1e36aec9ad750
-
SHA1
be2da4c89ce1379381587b261cb128b2dfbd05ea
-
SHA256
9e6840bd3bfa0c2d9dfc16193a3b67abf16bf84ffe374e1276540d1b8f3dd9fc
-
SHA512
e1006419e103d629277090c24d892efb8e60304bbc578266dd8ee87a1d13f437ebca5e4a872b28f20124efc9c16873e0caecedea685a8ce084213507be25b215
-
SSDEEP
12288:FQCy90Yh85xXh8uOm0i8TmUSMYPOsjmMrTF3VHp7:3y3h4tOGPOsjxF/
Static task
static1
Behavioral task
behavioral1
Sample
0a62172ecf9e400da1d1e36aec9ad750_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
0a62172ecf9e400da1d1e36aec9ad750_NeikiAnalytics.exe
-
Size
539KB
-
MD5
0a62172ecf9e400da1d1e36aec9ad750
-
SHA1
be2da4c89ce1379381587b261cb128b2dfbd05ea
-
SHA256
9e6840bd3bfa0c2d9dfc16193a3b67abf16bf84ffe374e1276540d1b8f3dd9fc
-
SHA512
e1006419e103d629277090c24d892efb8e60304bbc578266dd8ee87a1d13f437ebca5e4a872b28f20124efc9c16873e0caecedea685a8ce084213507be25b215
-
SSDEEP
12288:FQCy90Yh85xXh8uOm0i8TmUSMYPOsjmMrTF3VHp7:3y3h4tOGPOsjxF/
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1