General

  • Target

    428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe

  • Size

    743KB

  • Sample

    240528-n1s2zabe49

  • MD5

    428992dba52134bc4f24fef76b6deb00

  • SHA1

    f7ac3844b23d2ef68ce5abd29ae72e8c197404bc

  • SHA256

    522ef7ed5dee9a88fd0e157cf30caee38b2797c64e4d3e150f0e618147156bcb

  • SHA512

    81cab0e00fceccb1b9cb52e9102ca32c5821370f5293a1afc89c5f4c0ce4704114f44455f4e022c41e9f39abef338efbc55714d4a15ccbfb7d20f402cc482ba8

  • SSDEEP

    12288:FMrny902sofq/Zv6FIzBF/I6cJVVcz6qovPHcVIXJ9lwyrpr:myu1hvSIzBFg6c/VfqovvcVIZ/l

Malware Config

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Targets

    • Target

      428992dba52134bc4f24fef76b6deb00_NeikiAnalytics.exe

    • Size

      743KB

    • MD5

      428992dba52134bc4f24fef76b6deb00

    • SHA1

      f7ac3844b23d2ef68ce5abd29ae72e8c197404bc

    • SHA256

      522ef7ed5dee9a88fd0e157cf30caee38b2797c64e4d3e150f0e618147156bcb

    • SHA512

      81cab0e00fceccb1b9cb52e9102ca32c5821370f5293a1afc89c5f4c0ce4704114f44455f4e022c41e9f39abef338efbc55714d4a15ccbfb7d20f402cc482ba8

    • SSDEEP

      12288:FMrny902sofq/Zv6FIzBF/I6cJVVcz6qovPHcVIXJ9lwyrpr:myu1hvSIzBFg6c/VfqovvcVIZ/l

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks