General

  • Target

    a13fc9ad8cf55c496a185f18bd0a0740_NeikiAnalytics.exe

  • Size

    692KB

  • Sample

    240603-m8x58acc8w

  • MD5

    a13fc9ad8cf55c496a185f18bd0a0740

  • SHA1

    629025604464c5dccd662e3187eb32cfda1916ae

  • SHA256

    8ab296834f82cfcc09d242ca9b14991f94e5b8578e693e18cddc6e18583575ad

  • SHA512

    8dff6352b8503fdea23905f5dfe6008bd3354831b64e26d439c1ce5b3391c0f088b91546b69fd59ffc20db9ed1722364ddc26603edb6a2d71e7c58e234252fbd

  • SSDEEP

    12288:QMriy90R1s6OszLz0xY1RmI7wr6MNLKY8iUk2q5N1Uv6ioJAYHyGjBXL7tvC7l:iyb2H0u06CKYTr2q5kv6LAtyft2l

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Targets

    • Target

      a13fc9ad8cf55c496a185f18bd0a0740_NeikiAnalytics.exe

    • Size

      692KB

    • MD5

      a13fc9ad8cf55c496a185f18bd0a0740

    • SHA1

      629025604464c5dccd662e3187eb32cfda1916ae

    • SHA256

      8ab296834f82cfcc09d242ca9b14991f94e5b8578e693e18cddc6e18583575ad

    • SHA512

      8dff6352b8503fdea23905f5dfe6008bd3354831b64e26d439c1ce5b3391c0f088b91546b69fd59ffc20db9ed1722364ddc26603edb6a2d71e7c58e234252fbd

    • SSDEEP

      12288:QMriy90R1s6OszLz0xY1RmI7wr6MNLKY8iUk2q5N1Uv6ioJAYHyGjBXL7tvC7l:iyb2H0u06CKYTr2q5kv6LAtyft2l

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks