General

  • Target

    628a7a19e38899e1036ddc0bdf373950_NeikiAnalytics.exe

  • Size

    706KB

  • Sample

    240530-d2a8fadg67

  • MD5

    628a7a19e38899e1036ddc0bdf373950

  • SHA1

    fe5d1cf65413543d9772fef9fd716a18aa915bd6

  • SHA256

    35972fee98a4f38b67d5a87e951bf580a50ee6440bd0e902bb6db2a912cb2f61

  • SHA512

    ff189e553abdb451736a837aed4756ec2dc6fee3faee7425e42af6f344b0d110aa90df0258e31d88bf8e2d4e714db4ad99f34a9679dbfbe643d26d4ce30d912c

  • SSDEEP

    12288:nlgy90RtKuBQp78Lh0xO9xt3o1VJW7l8BSp6W7/QOXOMDRXOBJUs5Gu5ZFYo:GymhQ98LXxlQW+BenXfdXOBdhxYo

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Targets

    • Target

      628a7a19e38899e1036ddc0bdf373950_NeikiAnalytics.exe

    • Size

      706KB

    • MD5

      628a7a19e38899e1036ddc0bdf373950

    • SHA1

      fe5d1cf65413543d9772fef9fd716a18aa915bd6

    • SHA256

      35972fee98a4f38b67d5a87e951bf580a50ee6440bd0e902bb6db2a912cb2f61

    • SHA512

      ff189e553abdb451736a837aed4756ec2dc6fee3faee7425e42af6f344b0d110aa90df0258e31d88bf8e2d4e714db4ad99f34a9679dbfbe643d26d4ce30d912c

    • SSDEEP

      12288:nlgy90RtKuBQp78Lh0xO9xt3o1VJW7l8BSp6W7/QOXOMDRXOBJUs5Gu5ZFYo:GymhQ98LXxlQW+BenXfdXOBdhxYo

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks