General
-
Target
6063d6416f5d32fef626bef67d953880_NeikiAnalytics.exe
-
Size
706KB
-
Sample
240530-cvwp5abb51
-
MD5
6063d6416f5d32fef626bef67d953880
-
SHA1
dfa3ec3089bf946de3670331787d36e6d4bf9d90
-
SHA256
d9e8eb988cb030034b6748c52927764a8f251a4ed39c62639b0d9b30f35ca90b
-
SHA512
86456e38cc6ff3ba70bd5140147cf63fce89d990c8b8cfcaeccca73ce391188feb274ab55c878ca080226b73d4f179871a13e317fd2df3394c70092da28b4542
-
SSDEEP
12288:xr/y90QTV3zN0uER7O7RUENY3jlCx+O+JUPizryXMQ9:By5TV3zu8qBlQ+ZUPizmcQ9
Static task
static1
Behavioral task
behavioral1
Sample
6063d6416f5d32fef626bef67d953880_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Targets
-
-
Target
6063d6416f5d32fef626bef67d953880_NeikiAnalytics.exe
-
Size
706KB
-
MD5
6063d6416f5d32fef626bef67d953880
-
SHA1
dfa3ec3089bf946de3670331787d36e6d4bf9d90
-
SHA256
d9e8eb988cb030034b6748c52927764a8f251a4ed39c62639b0d9b30f35ca90b
-
SHA512
86456e38cc6ff3ba70bd5140147cf63fce89d990c8b8cfcaeccca73ce391188feb274ab55c878ca080226b73d4f179871a13e317fd2df3394c70092da28b4542
-
SSDEEP
12288:xr/y90QTV3zN0uER7O7RUENY3jlCx+O+JUPizryXMQ9:By5TV3zu8qBlQ+ZUPizmcQ9
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1