General

  • Target

    53560798291b00d28ef79300ba5e02fe63960c2cf35692b3f954161a78e6dd93_NeikiAnalytics.exe

  • Size

    332KB

  • Sample

    240629-dbw28azamd

  • MD5

    080dfde2b97288c6b9087523d81114e0

  • SHA1

    9765d4447bc8bf88aa1f9e0f137008a9bfb9d420

  • SHA256

    53560798291b00d28ef79300ba5e02fe63960c2cf35692b3f954161a78e6dd93

  • SHA512

    cfbb02ba05d34380803abc48414135062ad50e3e52b32a0470037cb235257a9cef02c4444f8ffb49630184e8c8d791ffaff36fa8a20e51fcaedd83c1537185ae

  • SSDEEP

    6144:hcylWoqkeuZ0Eiq06unicPfUumqXQubK+efN/sWuixwLh6MlM:CqWbPZDqjuicPfj8ubDefN/sW2Bl

Malware Config

Extracted

Family

redline

Botnet

7021425935_99

C2

https://t.me/+J_Z1QGHfHko0MGZi*https://steamcommunity.com/id/elcadillac

Targets

    • Target

      53560798291b00d28ef79300ba5e02fe63960c2cf35692b3f954161a78e6dd93_NeikiAnalytics.exe

    • Size

      332KB

    • MD5

      080dfde2b97288c6b9087523d81114e0

    • SHA1

      9765d4447bc8bf88aa1f9e0f137008a9bfb9d420

    • SHA256

      53560798291b00d28ef79300ba5e02fe63960c2cf35692b3f954161a78e6dd93

    • SHA512

      cfbb02ba05d34380803abc48414135062ad50e3e52b32a0470037cb235257a9cef02c4444f8ffb49630184e8c8d791ffaff36fa8a20e51fcaedd83c1537185ae

    • SSDEEP

      6144:hcylWoqkeuZ0Eiq06unicPfUumqXQubK+efN/sWuixwLh6MlM:CqWbPZDqjuicPfj8ubDefN/sW2Bl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks