General
-
Target
87a1d0af4685f78fd81e98a65bfd5230_NeikiAnalytics.exe
-
Size
555KB
-
Sample
240613-z4dbgazfnf
-
MD5
87a1d0af4685f78fd81e98a65bfd5230
-
SHA1
10a9b837e575b7cf043c1d7701f49ac5261e386c
-
SHA256
37bb007e1a7b802fb160d31d43e6ee29920fb53b1d37beda1c042d893778cab5
-
SHA512
a406492fcf0a39d9d536ed2aff82eba7b7336728b5df8d1b83fd71f500c560a1253889ec96175017ce5bca02b89b536210720b664f18c26d1d44105a42fb45d7
-
SSDEEP
12288:nMryy90QSz/Fi0ZQMEI1yMQHbnRa+bPYvBTJBu8rGyFb:1yb47CU0HbRFjYNXb
Static task
static1
Behavioral task
behavioral1
Sample
87a1d0af4685f78fd81e98a65bfd5230_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
virad
77.91.124.82:19071
-
auth_value
434dd63619ca8bbf10125913fb40ca28
Targets
-
-
Target
87a1d0af4685f78fd81e98a65bfd5230_NeikiAnalytics.exe
-
Size
555KB
-
MD5
87a1d0af4685f78fd81e98a65bfd5230
-
SHA1
10a9b837e575b7cf043c1d7701f49ac5261e386c
-
SHA256
37bb007e1a7b802fb160d31d43e6ee29920fb53b1d37beda1c042d893778cab5
-
SHA512
a406492fcf0a39d9d536ed2aff82eba7b7336728b5df8d1b83fd71f500c560a1253889ec96175017ce5bca02b89b536210720b664f18c26d1d44105a42fb45d7
-
SSDEEP
12288:nMryy90QSz/Fi0ZQMEI1yMQHbnRa+bPYvBTJBu8rGyFb:1yb47CU0HbRFjYNXb
Score10/10-
Detect Mystic stealer payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-