Behavioral task
behavioral1
Sample
3faec4d96b312f7163b282c02c7d3750_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3faec4d96b312f7163b282c02c7d3750_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3faec4d96b312f7163b282c02c7d3750_NeikiAnalytics.exe
-
Size
172KB
-
MD5
3faec4d96b312f7163b282c02c7d3750
-
SHA1
2489a419b5e113115bace02a933c090fac806b19
-
SHA256
f5f6c22b20efe1faeea5c451cb37c282bc4d794c2c9eb34fb8b3cb76f1ab476b
-
SHA512
ff1a4168ddd2290ecdef43490824a26ce222bb35ebd4cca6d17479a9218e918252b54e25c078572bb36e00971bf96ebe5807bd0f02bd8c87bbe36d868217e402
-
SSDEEP
3072:Y47FCYO0NJQ5S0xNcIA7qVJeNGT8e8hy:Yvd0AEnCVJeNGT
Malware Config
Extracted
redline
drake
83.97.73.131:19071
-
auth_value
74ce6ffe4025a2e4027fb727915e7d7c
Signatures
-
RedLine payload 1 IoCs
Processes:
resource yara_rule sample family_redline -
Redline family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3faec4d96b312f7163b282c02c7d3750_NeikiAnalytics.exe
Files
-
3faec4d96b312f7163b282c02c7d3750_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ