General
-
Target
deflated-gimp-2.10.32.-setup-1.exe
-
Size
217KB
-
Sample
230127-e5p2fagd85
-
MD5
009d70132e15d6f0bf593da170f0b7b0
-
SHA1
5a1bd8f31059de4e46778510fffd23c87bc32740
-
SHA256
af8ea2ae4917c68825f1c60f3900634cc7c2d3d2de079215f1aacf116841418c
-
SHA512
5192b9c860b4e10a329b181f4419cd7443f602ec9174d9c538e0843d10e59e4472df0e1b2a6572d96f89ad061eb1f6ea6240c8dd11d860664f93500dbee4824d
-
SSDEEP
3072:uI71VdaROKutNI6mKR0QHTT1Xm4B1jj0hhih3GD2xvwN64u/KKR7:uInda0KuksNzB1jjAoGD2lww4V
Static task
static1
Behavioral task
behavioral1
Sample
deflated-gimp-2.10.32.-setup-1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
deflated-gimp-2.10.32.-setup-1.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
redline
79.137.133.225:25999
-
auth_value
38284dbf15da9b4a9eaee0ef0d2b343f
Extracted
aurora
79.137.133.225:8081
Targets
-
-
Target
deflated-gimp-2.10.32.-setup-1.exe
-
Size
217KB
-
MD5
009d70132e15d6f0bf593da170f0b7b0
-
SHA1
5a1bd8f31059de4e46778510fffd23c87bc32740
-
SHA256
af8ea2ae4917c68825f1c60f3900634cc7c2d3d2de079215f1aacf116841418c
-
SHA512
5192b9c860b4e10a329b181f4419cd7443f602ec9174d9c538e0843d10e59e4472df0e1b2a6572d96f89ad061eb1f6ea6240c8dd11d860664f93500dbee4824d
-
SSDEEP
3072:uI71VdaROKutNI6mKR0QHTT1Xm4B1jj0hhih3GD2xvwN64u/KKR7:uInda0KuksNzB1jjAoGD2lww4V
-
Detect PureCrypter injector
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-