General
-
Target
23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa_NeikiAnalytics.exe
-
Size
660KB
-
Sample
240624-av7raatgmq
-
MD5
0349900a4eb15cde34ce52818633a1d0
-
SHA1
56f1001d82f8b20431397f266256b1b276d6f474
-
SHA256
23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa
-
SHA512
61db6915f16fde52c5ac769d5bbdb33b50eab755a720d72e0c8c3e70cb05c79386f87a166976fe152e15973f87c1ed764664ac83541b13a79ffeee2fc45c3d56
-
SSDEEP
12288:Qpuy90bdYwvrcrycpRIvhv/IV9w8r03ZiXiLdmk7Hu2sjL7p:DySd3I2cpRkl/IVq+IiEzu2y
Static task
static1
Behavioral task
behavioral1
Sample
23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
redline
hares
83.97.73.128:19071
-
auth_value
62fed2fd42b168e956200885cefb36a7
Targets
-
-
Target
23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa_NeikiAnalytics.exe
-
Size
660KB
-
MD5
0349900a4eb15cde34ce52818633a1d0
-
SHA1
56f1001d82f8b20431397f266256b1b276d6f474
-
SHA256
23fff09f2f63491da2c2bab5c5eceae1af49b5242bdb2921ce4b83d5c212fefa
-
SHA512
61db6915f16fde52c5ac769d5bbdb33b50eab755a720d72e0c8c3e70cb05c79386f87a166976fe152e15973f87c1ed764664ac83541b13a79ffeee2fc45c3d56
-
SSDEEP
12288:Qpuy90bdYwvrcrycpRIvhv/IV9w8r03ZiXiLdmk7Hu2sjL7p:DySd3I2cpRkl/IVq+IiEzu2y
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1