Overview
overview
10Static
static
10CSGOhack.exe
windows7_x64
10CSGOhack.exe
windows10_x64
10Minecraft_v4.3.exe
windows7_x64
10Minecraft_v4.3.exe
windows10_x64
10SetupCrack.exe
windows7_x64
10SetupCrack.exe
windows10_x64
10Vape Crack.exe
windows7_x64
10Vape Crack.exe
windows10_x64
10cheat.exe
windows7_x64
9cheat.exe
windows10_x64
9launcher.exe
windows7_x64
launcher.exe
windows10_x64
10onetap.exe
windows7_x64
10onetap.exe
windows10_x64
10Minecraft_v4.3.exe
windows7_x64
10Minecraft_v4.3.exe
windows10_x64
10SetupCrack.exe
windows7_x64
10SetupCrack.exe
windows10_x64
10Vape Crack.exe
windows7_x64
10Vape Crack.exe
windows10_x64
10cheat.exe
windows7_x64
9cheat.exe
windows10_x64
9launcher.exe
windows7_x64
10launcher.exe
windows10_x64
10onetap.exe
windows7_x64
10onetap.exe
windows10_x64
10General
-
Target
Minecraft v4.3.rar
-
Size
27.2MB
-
Sample
210810-qv38tjvgyn
-
MD5
b7b82119736f96caa292bbf142128b00
-
SHA1
8ee0eed1966e6b5abae0d11500af9856582ecf9f
-
SHA256
592ea2c548c74f9778a17ac78eba08eb7bfde214d690a7e593731fdbd604c877
-
SHA512
36d65fd54afcd91289a6e2c1f10596c40ffca68b2b31bea83df599439c2195b78d1c1917338282c8341107e4db92a536c2665fecacf2a2cd8b4e31882e8e4e6d
Static task
static1
Behavioral task
behavioral1
Sample
CSGOhack.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
CSGOhack.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
Minecraft_v4.3.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Minecraft_v4.3.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
SetupCrack.exe
Resource
win7v20210408
Behavioral task
behavioral6
Sample
SetupCrack.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
Vape Crack.exe
Resource
win7v20210408
Behavioral task
behavioral8
Sample
Vape Crack.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
cheat.exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
cheat.exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
launcher.exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
launcher.exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
onetap.exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
onetap.exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
Minecraft_v4.3.exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
Minecraft_v4.3.exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
SetupCrack.exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
SetupCrack.exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
Vape Crack.exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
Vape Crack.exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
cheat.exe
Resource
win7v20210408
Behavioral task
behavioral22
Sample
cheat.exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
launcher.exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
launcher.exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
onetap.exe
Resource
win7v20210410
Malware Config
Extracted
redline
boss7
109.248.201.150:63757
Extracted
redline
Ninja0809
185.92.73.140:80
Extracted
redline
@bestiefFcs
37.46.128.72:29799
Extracted
redline
@killyxu
3.68.106.170:59223
Extracted
redline
@tupa187
37.1.213.214:63028
Targets
-
-
Target
CSGOhack.exe
-
Size
681KB
-
MD5
ef7fe4b7b3228cd6489817ec4fd9dffa
-
SHA1
d913aa1d8028bf6e02a240b7c07d8638757af7fc
-
SHA256
ca322f6d0db4e99ec9df55fa02ba3ef49557ce5ee932e44888a687418a91fbc4
-
SHA512
c2f951b0a1098a93713b66bc735df52ac52793f9ecb98f0ad425f372cd13eadc430db0e733a33b9bd76986bfb6a28ba1676da565e84094ed3a68c7aaad1d8833
Score10/10 -
-
-
Target
Minecraft_v4.3.exe
-
Size
1.9MB
-
MD5
54263196f68701f4d74ecce284ebf501
-
SHA1
7432a4a4a57973d77ca7f65a2be4bb357efddc30
-
SHA256
8f9d77e5b65e2263f81d3398d3cc6741752702021bb5aa6a2a716cf6f6e204d5
-
SHA512
bbda9e72dd377915f6a065b52d4bbb4ceb5f4c22197ced84b78cee644a2dd408e375ee41cfa00e454fe45b3b953f3bb8747fac223d878d23bb9800bb5a8c8ff9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
-
-
Target
SetupCrack.exe
-
Size
373KB
-
MD5
362fdb2e05006cd91ae2d090179b4642
-
SHA1
b369e9475eea2e950112592944df5f2b88468fb9
-
SHA256
574e22b44f2b1a0af1e8344a2e674d62c246287fa41c9ee3725120bc329a8a89
-
SHA512
03b049d1214d55e0f8c64b617a8ad04c4aed8a4d97a4bb141c8165fb4d77253291c599f949789b88b6c95fee0a84b4d88b4073e5526269a80dfb57aaab46adff
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
-
-
Target
Vape Crack.exe
-
Size
796KB
-
MD5
a61f6f94009c04607f1ba923adcaba0d
-
SHA1
71b964ba1d7a6ddcebb9fadf29efba3f440c00af
-
SHA256
36022c868a49fc44968f6647239106f536b2cae40340ad69e3772f7be482daf7
-
SHA512
0d108e686fa33405b2deb127de0cb4ab60d9960d1af43ea4886496f8249c131da8a5a378b6f61b3d8e09179a295e2a7365b01d2db22d0fd916ce3190904a97dd
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Looks for VMWare Tools registry key
-
Suspicious use of SetThreadContext
-
-
-
Target
cheat.exe
-
Size
12.2MB
-
MD5
69c885675b1b98e2fbb3f0196a1df2d1
-
SHA1
533fa79f3b20623ae1c6de3fded5fb54b145af6a
-
SHA256
73bcd67ddecc7bf320a19bd5dbefdb36c097c3047959d67e0e3cc5e22f8b510b
-
SHA512
8b89b0a456e9d423c7e0d053772716f2e0e7877bff250e08f788d20b20fcb00bb6da831f59a781964ede23f9de74b5afcda0183d104fca523b392a89d063e44c
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
launcher.exe
-
Size
378KB
-
MD5
36aeb708e396c2627e52d8c50d8ea287
-
SHA1
e1bd5ab1cb291915db4e3d03b0e88b4dc737f53a
-
SHA256
b35f6e33f997d11867056950aae71610d3bbef64eb443db3aed8a49cc850e226
-
SHA512
1ad276b880dd136f4364ccf0361d8ef3c790a6f178c39f1fd0c365b93f789595c7060f90020b7b4f0592a3c0f64444b194c83fc7652ffbad3afa5f14b8574a6d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
-
-
Target
onetap.exe
-
Size
400KB
-
MD5
7914f8165ade3f483e1f62dce8ec8828
-
SHA1
7ac59abb131d0644d0f0aa31cb99cf0a415deb9e
-
SHA256
e5b091808b73fbf1b94a24bb98d8ac945012ec6b69f0979371af225ecdb804df
-
SHA512
e3b4e163e9cbb2fb4719c09c2274af3e068f762d570b1d24093be411ef9b81ba91c10d92317a8af6a050bc4dd34a9a4bc67861ce00bff5e09383281e95163aa7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
-
-
Target
Minecraft_v4.3.exe
-
Size
1.9MB
-
MD5
54263196f68701f4d74ecce284ebf501
-
SHA1
7432a4a4a57973d77ca7f65a2be4bb357efddc30
-
SHA256
8f9d77e5b65e2263f81d3398d3cc6741752702021bb5aa6a2a716cf6f6e204d5
-
SHA512
bbda9e72dd377915f6a065b52d4bbb4ceb5f4c22197ced84b78cee644a2dd408e375ee41cfa00e454fe45b3b953f3bb8747fac223d878d23bb9800bb5a8c8ff9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
SetupCrack.exe
-
Size
373KB
-
MD5
362fdb2e05006cd91ae2d090179b4642
-
SHA1
b369e9475eea2e950112592944df5f2b88468fb9
-
SHA256
574e22b44f2b1a0af1e8344a2e674d62c246287fa41c9ee3725120bc329a8a89
-
SHA512
03b049d1214d55e0f8c64b617a8ad04c4aed8a4d97a4bb141c8165fb4d77253291c599f949789b88b6c95fee0a84b4d88b4073e5526269a80dfb57aaab46adff
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
-
-
Target
Vape Crack.exe
-
Size
796KB
-
MD5
a61f6f94009c04607f1ba923adcaba0d
-
SHA1
71b964ba1d7a6ddcebb9fadf29efba3f440c00af
-
SHA256
36022c868a49fc44968f6647239106f536b2cae40340ad69e3772f7be482daf7
-
SHA512
0d108e686fa33405b2deb127de0cb4ab60d9960d1af43ea4886496f8249c131da8a5a378b6f61b3d8e09179a295e2a7365b01d2db22d0fd916ce3190904a97dd
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Looks for VMWare Tools registry key
-
Suspicious use of SetThreadContext
-
-
-
Target
cheat.exe
-
Size
12.2MB
-
MD5
69c885675b1b98e2fbb3f0196a1df2d1
-
SHA1
533fa79f3b20623ae1c6de3fded5fb54b145af6a
-
SHA256
73bcd67ddecc7bf320a19bd5dbefdb36c097c3047959d67e0e3cc5e22f8b510b
-
SHA512
8b89b0a456e9d423c7e0d053772716f2e0e7877bff250e08f788d20b20fcb00bb6da831f59a781964ede23f9de74b5afcda0183d104fca523b392a89d063e44c
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
launcher.exe
-
Size
378KB
-
MD5
36aeb708e396c2627e52d8c50d8ea287
-
SHA1
e1bd5ab1cb291915db4e3d03b0e88b4dc737f53a
-
SHA256
b35f6e33f997d11867056950aae71610d3bbef64eb443db3aed8a49cc850e226
-
SHA512
1ad276b880dd136f4364ccf0361d8ef3c790a6f178c39f1fd0c365b93f789595c7060f90020b7b4f0592a3c0f64444b194c83fc7652ffbad3afa5f14b8574a6d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
-
-
Target
onetap.exe
-
Size
400KB
-
MD5
7914f8165ade3f483e1f62dce8ec8828
-
SHA1
7ac59abb131d0644d0f0aa31cb99cf0a415deb9e
-
SHA256
e5b091808b73fbf1b94a24bb98d8ac945012ec6b69f0979371af225ecdb804df
-
SHA512
e3b4e163e9cbb2fb4719c09c2274af3e068f762d570b1d24093be411ef9b81ba91c10d92317a8af6a050bc4dd34a9a4bc67861ce00bff5e09383281e95163aa7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-