General
-
Target
45a24ec4b4f6d18f63626f37f3c3d57203314d63bade072763ace0a44b54d2b0_NeikiAnalytics.exe
-
Size
1.6MB
-
Sample
240627-d23yfszfmh
-
MD5
6b0c7d583d810ad603b287c58ff72780
-
SHA1
04c71804468908033b7d8a4bca4805def97df8ce
-
SHA256
45a24ec4b4f6d18f63626f37f3c3d57203314d63bade072763ace0a44b54d2b0
-
SHA512
f689f94400739f159fc7540ba6d14d5aff87a3dc10b6f1c7f33ab8739ff700853f9c657b8be05cbdec7254eb00ea8d900f1debf6bdfe4fa3d4ca83a666c625c8
-
SSDEEP
24576:LBhJX/5PpGEvqQmfM63Q1xlPVc1ZQBQkoTjPCpKTbzMxaZE7mdi9cqApEaikz:J/9C0Pyz6DMPCMTbzdZEmBqApykz
Static task
static1
Behavioral task
behavioral1
Sample
45a24ec4b4f6d18f63626f37f3c3d57203314d63bade072763ace0a44b54d2b0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
45a24ec4b4f6d18f63626f37f3c3d57203314d63bade072763ace0a44b54d2b0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
redline
@nmrzv88
94.228.166.68:80
Targets
-
-
Target
45a24ec4b4f6d18f63626f37f3c3d57203314d63bade072763ace0a44b54d2b0_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
6b0c7d583d810ad603b287c58ff72780
-
SHA1
04c71804468908033b7d8a4bca4805def97df8ce
-
SHA256
45a24ec4b4f6d18f63626f37f3c3d57203314d63bade072763ace0a44b54d2b0
-
SHA512
f689f94400739f159fc7540ba6d14d5aff87a3dc10b6f1c7f33ab8739ff700853f9c657b8be05cbdec7254eb00ea8d900f1debf6bdfe4fa3d4ca83a666c625c8
-
SSDEEP
24576:LBhJX/5PpGEvqQmfM63Q1xlPVc1ZQBQkoTjPCpKTbzMxaZE7mdi9cqApEaikz:J/9C0Pyz6DMPCMTbzdZEmBqApykz
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-