General

  • Target

    87a1d0af4685f78fd81e98a65bfd5230_NeikiAnalytics.exe

  • Size

    555KB

  • Sample

    240613-z4dbgazfnf

  • MD5

    87a1d0af4685f78fd81e98a65bfd5230

  • SHA1

    10a9b837e575b7cf043c1d7701f49ac5261e386c

  • SHA256

    37bb007e1a7b802fb160d31d43e6ee29920fb53b1d37beda1c042d893778cab5

  • SHA512

    a406492fcf0a39d9d536ed2aff82eba7b7336728b5df8d1b83fd71f500c560a1253889ec96175017ce5bca02b89b536210720b664f18c26d1d44105a42fb45d7

  • SSDEEP

    12288:nMryy90QSz/Fi0ZQMEI1yMQHbnRa+bPYvBTJBu8rGyFb:1yb47CU0HbRFjYNXb

Malware Config

Extracted

Family

redline

Botnet

virad

C2

77.91.124.82:19071

Attributes
  • auth_value

    434dd63619ca8bbf10125913fb40ca28

Targets

    • Target

      87a1d0af4685f78fd81e98a65bfd5230_NeikiAnalytics.exe

    • Size

      555KB

    • MD5

      87a1d0af4685f78fd81e98a65bfd5230

    • SHA1

      10a9b837e575b7cf043c1d7701f49ac5261e386c

    • SHA256

      37bb007e1a7b802fb160d31d43e6ee29920fb53b1d37beda1c042d893778cab5

    • SHA512

      a406492fcf0a39d9d536ed2aff82eba7b7336728b5df8d1b83fd71f500c560a1253889ec96175017ce5bca02b89b536210720b664f18c26d1d44105a42fb45d7

    • SSDEEP

      12288:nMryy90QSz/Fi0ZQMEI1yMQHbnRa+bPYvBTJBu8rGyFb:1yb47CU0HbRFjYNXb

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks