General
-
Target
6a15c101b3f6e376ffaf607a14ea8f40_NeikiAnalytics.exe
-
Size
1.0MB
-
Sample
240530-1x2wxscb83
-
MD5
6a15c101b3f6e376ffaf607a14ea8f40
-
SHA1
83507272190485951dcd78f107833701aca91295
-
SHA256
c60ce9811a203045561fcf4dec934cd086b36c7b5dc3def69dbf80382d3fffe1
-
SHA512
5704db3e2b4a50d0944073a458bc41f80cb7d98017bf40c5fb1d80fa85a3d58cbf62c1edc699733243f81429625b162ae6087db2e91161e3f5e15c3e8a35c8c9
-
SSDEEP
24576:UyNaaSNlgnyzqGjqTThZ5gSHazMycERNPEc5M4e4:jwaSeTz5tXycETTM4e
Static task
static1
Behavioral task
behavioral1
Sample
6a15c101b3f6e376ffaf607a14ea8f40_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
6a15c101b3f6e376ffaf607a14ea8f40_NeikiAnalytics.exe
-
Size
1.0MB
-
MD5
6a15c101b3f6e376ffaf607a14ea8f40
-
SHA1
83507272190485951dcd78f107833701aca91295
-
SHA256
c60ce9811a203045561fcf4dec934cd086b36c7b5dc3def69dbf80382d3fffe1
-
SHA512
5704db3e2b4a50d0944073a458bc41f80cb7d98017bf40c5fb1d80fa85a3d58cbf62c1edc699733243f81429625b162ae6087db2e91161e3f5e15c3e8a35c8c9
-
SSDEEP
24576:UyNaaSNlgnyzqGjqTThZ5gSHazMycERNPEc5M4e4:jwaSeTz5tXycETTM4e
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1