General
-
Target
a13fc9ad8cf55c496a185f18bd0a0740_NeikiAnalytics.exe
-
Size
692KB
-
Sample
240603-m8x58acc8w
-
MD5
a13fc9ad8cf55c496a185f18bd0a0740
-
SHA1
629025604464c5dccd662e3187eb32cfda1916ae
-
SHA256
8ab296834f82cfcc09d242ca9b14991f94e5b8578e693e18cddc6e18583575ad
-
SHA512
8dff6352b8503fdea23905f5dfe6008bd3354831b64e26d439c1ce5b3391c0f088b91546b69fd59ffc20db9ed1722364ddc26603edb6a2d71e7c58e234252fbd
-
SSDEEP
12288:QMriy90R1s6OszLz0xY1RmI7wr6MNLKY8iUk2q5N1Uv6ioJAYHyGjBXL7tvC7l:iyb2H0u06CKYTr2q5kv6LAtyft2l
Static task
static1
Behavioral task
behavioral1
Sample
a13fc9ad8cf55c496a185f18bd0a0740_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Targets
-
-
Target
a13fc9ad8cf55c496a185f18bd0a0740_NeikiAnalytics.exe
-
Size
692KB
-
MD5
a13fc9ad8cf55c496a185f18bd0a0740
-
SHA1
629025604464c5dccd662e3187eb32cfda1916ae
-
SHA256
8ab296834f82cfcc09d242ca9b14991f94e5b8578e693e18cddc6e18583575ad
-
SHA512
8dff6352b8503fdea23905f5dfe6008bd3354831b64e26d439c1ce5b3391c0f088b91546b69fd59ffc20db9ed1722364ddc26603edb6a2d71e7c58e234252fbd
-
SSDEEP
12288:QMriy90R1s6OszLz0xY1RmI7wr6MNLKY8iUk2q5N1Uv6ioJAYHyGjBXL7tvC7l:iyb2H0u06CKYTr2q5kv6LAtyft2l
-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-