General
-
Target
524de6f8f308e020feedf2985cc09740_NeikiAnalytics.exe
-
Size
659KB
-
Sample
240529-m4es3sda63
-
MD5
524de6f8f308e020feedf2985cc09740
-
SHA1
ba598614c3bf3a4bf15b75d419fdee91ff36898e
-
SHA256
15e02cda02d7fe57c75ba5547dad1948b5efa35b43b18fb96c24384404396454
-
SHA512
3274a41d9a1382869667cbf4a12408665e4ff966849ec7fae6fd917fb142c6d13c6037fc3789f55353629b8dec8ea92718cc2e50238aac510aa8d653152f3e3f
-
SSDEEP
12288:4Xdy90g1GuDGsheu6Qnjrxh3KsnYVAgoOWw6nDooysb/Vmo8MP0s:+y/GyRPJjrpHJzDuszVT8M9
Static task
static1
Behavioral task
behavioral1
Sample
524de6f8f308e020feedf2985cc09740_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
redline
hares
83.97.73.128:19071
-
auth_value
62fed2fd42b168e956200885cefb36a7
Targets
-
-
Target
524de6f8f308e020feedf2985cc09740_NeikiAnalytics.exe
-
Size
659KB
-
MD5
524de6f8f308e020feedf2985cc09740
-
SHA1
ba598614c3bf3a4bf15b75d419fdee91ff36898e
-
SHA256
15e02cda02d7fe57c75ba5547dad1948b5efa35b43b18fb96c24384404396454
-
SHA512
3274a41d9a1382869667cbf4a12408665e4ff966849ec7fae6fd917fb142c6d13c6037fc3789f55353629b8dec8ea92718cc2e50238aac510aa8d653152f3e3f
-
SSDEEP
12288:4Xdy90g1GuDGsheu6Qnjrxh3KsnYVAgoOWw6nDooysb/Vmo8MP0s:+y/GyRPJjrpHJzDuszVT8M9
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1