General

  • Target

    5ac83bd221e5aa673ddbf5407d6b2920_NeikiAnalytics.exe

  • Size

    554KB

  • Sample

    240526-dw63xsda9t

  • MD5

    5ac83bd221e5aa673ddbf5407d6b2920

  • SHA1

    aa1d2f7a60650fd69fc093e03e2f115efe11833a

  • SHA256

    eafdc6a13ded3d61dfa7f865e7aa41d10ac988356a2468d62facba42750f56e9

  • SHA512

    e8628a6b2837adb5df0f0469993c5dbffbb758f0cba86d67da464a51e3da7f887aceac78ab679c6c777c034eb0f45127ad2722ef6df044b0e95b7c4f5629f8a8

  • SSDEEP

    6144:Kfy+bi+Wp0yN90QEqzToR5XTbHJpkk52nDyOE645c5EHhNuhGaafJfw7/L4uKVVl:dtOy908ODLJt2ETfWhTwZwPsp3DHr

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      5ac83bd221e5aa673ddbf5407d6b2920_NeikiAnalytics.exe

    • Size

      554KB

    • MD5

      5ac83bd221e5aa673ddbf5407d6b2920

    • SHA1

      aa1d2f7a60650fd69fc093e03e2f115efe11833a

    • SHA256

      eafdc6a13ded3d61dfa7f865e7aa41d10ac988356a2468d62facba42750f56e9

    • SHA512

      e8628a6b2837adb5df0f0469993c5dbffbb758f0cba86d67da464a51e3da7f887aceac78ab679c6c777c034eb0f45127ad2722ef6df044b0e95b7c4f5629f8a8

    • SSDEEP

      6144:Kfy+bi+Wp0yN90QEqzToR5XTbHJpkk52nDyOE645c5EHhNuhGaafJfw7/L4uKVVl:dtOy908ODLJt2ETfWhTwZwPsp3DHr

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks