General

  • Target

    45a24ec4b4f6d18f63626f37f3c3d57203314d63bade072763ace0a44b54d2b0_NeikiAnalytics.exe

  • Size

    1.6MB

  • Sample

    240627-d23yfszfmh

  • MD5

    6b0c7d583d810ad603b287c58ff72780

  • SHA1

    04c71804468908033b7d8a4bca4805def97df8ce

  • SHA256

    45a24ec4b4f6d18f63626f37f3c3d57203314d63bade072763ace0a44b54d2b0

  • SHA512

    f689f94400739f159fc7540ba6d14d5aff87a3dc10b6f1c7f33ab8739ff700853f9c657b8be05cbdec7254eb00ea8d900f1debf6bdfe4fa3d4ca83a666c625c8

  • SSDEEP

    24576:LBhJX/5PpGEvqQmfM63Q1xlPVc1ZQBQkoTjPCpKTbzMxaZE7mdi9cqApEaikz:J/9C0Pyz6DMPCMTbzdZEmBqApykz

Malware Config

Extracted

Family

redline

Botnet

@nmrzv88

C2

94.228.166.68:80

Targets

    • Target

      45a24ec4b4f6d18f63626f37f3c3d57203314d63bade072763ace0a44b54d2b0_NeikiAnalytics.exe

    • Size

      1.6MB

    • MD5

      6b0c7d583d810ad603b287c58ff72780

    • SHA1

      04c71804468908033b7d8a4bca4805def97df8ce

    • SHA256

      45a24ec4b4f6d18f63626f37f3c3d57203314d63bade072763ace0a44b54d2b0

    • SHA512

      f689f94400739f159fc7540ba6d14d5aff87a3dc10b6f1c7f33ab8739ff700853f9c657b8be05cbdec7254eb00ea8d900f1debf6bdfe4fa3d4ca83a666c625c8

    • SSDEEP

      24576:LBhJX/5PpGEvqQmfM63Q1xlPVc1ZQBQkoTjPCpKTbzMxaZE7mdi9cqApEaikz:J/9C0Pyz6DMPCMTbzdZEmBqApykz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks