General
-
Target
662da062f44427bae8ac9cb902d93210_NeikiAnalytics.exe
-
Size
374KB
-
Sample
240526-e33jraff77
-
MD5
662da062f44427bae8ac9cb902d93210
-
SHA1
1b98a3e6f08772ea1c89d247af418ca31d6f30ae
-
SHA256
8c79cf058d5b20de529f66cf390646a82bc614e704963cfd37666328861a32c8
-
SHA512
57c8105994381536397041b8acf8192841f57bfe43ec25d8e60508d134c46fb24b08c8b238b39eacf38b55c903a1b7473c8ba3fd6501b43c0e26b13d11f8e91c
-
SSDEEP
6144:KZy+bC+Ep0yN90QEJRJncwhleyRXPxXAmpxW6HdzwDUymicKKfgnpS7yexXj60Ci:39wy90DncwhxxQO0MRwDU5fgn0lVj7
Static task
static1
Behavioral task
behavioral1
Sample
662da062f44427bae8ac9cb902d93210_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Targets
-
-
Target
662da062f44427bae8ac9cb902d93210_NeikiAnalytics.exe
-
Size
374KB
-
MD5
662da062f44427bae8ac9cb902d93210
-
SHA1
1b98a3e6f08772ea1c89d247af418ca31d6f30ae
-
SHA256
8c79cf058d5b20de529f66cf390646a82bc614e704963cfd37666328861a32c8
-
SHA512
57c8105994381536397041b8acf8192841f57bfe43ec25d8e60508d134c46fb24b08c8b238b39eacf38b55c903a1b7473c8ba3fd6501b43c0e26b13d11f8e91c
-
SSDEEP
6144:KZy+bC+Ep0yN90QEJRJncwhleyRXPxXAmpxW6HdzwDUymicKKfgnpS7yexXj60Ci:39wy90DncwhxxQO0MRwDU5fgn0lVj7
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1