General
-
Target
a2f5f87f7d25481004c2c6da1f022450_NeikiAnalytics.exe
-
Size
545KB
-
Sample
240603-pb5j5sfb89
-
MD5
a2f5f87f7d25481004c2c6da1f022450
-
SHA1
bcf0f32cab9cedaf8929ff66bb9c903fb5c7902e
-
SHA256
05341c747477ce8558d109583a18a3c8a476aed73da8ba0a16ac1f4fb2f65a7b
-
SHA512
6208738780d1c84b46856ce9c5e18f95f342c6c3963bf12a6e043883361ed717c84e7690195a805df24731c528dd5a60fcef210552eaea6e96aff3eac91061be
-
SSDEEP
12288:mf4y90yPlylyawHzEHPnRmNlPyJCvlz1:1y+lrqEHASJg1
Static task
static1
Behavioral task
behavioral1
Sample
a2f5f87f7d25481004c2c6da1f022450_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Targets
-
-
Target
a2f5f87f7d25481004c2c6da1f022450_NeikiAnalytics.exe
-
Size
545KB
-
MD5
a2f5f87f7d25481004c2c6da1f022450
-
SHA1
bcf0f32cab9cedaf8929ff66bb9c903fb5c7902e
-
SHA256
05341c747477ce8558d109583a18a3c8a476aed73da8ba0a16ac1f4fb2f65a7b
-
SHA512
6208738780d1c84b46856ce9c5e18f95f342c6c3963bf12a6e043883361ed717c84e7690195a805df24731c528dd5a60fcef210552eaea6e96aff3eac91061be
-
SSDEEP
12288:mf4y90yPlylyawHzEHPnRmNlPyJCvlz1:1y+lrqEHASJg1
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1