General
-
Target
Lcovlccdxd.exe
-
Size
1.2MB
-
Sample
230201-y4nlrsdf9z
-
MD5
d3713110654dc546bd5edc306a6e7efd
-
SHA1
db266e554e96098584bcbb29aa2774106a7e90bf
-
SHA256
97bfa0bd9f3b382280f67839c650a3d7be16aa31f124810f3a9b9559e34619c6
-
SHA512
35013774da17edf34b0d632766d54a55609d4c68b12da758b26016e5590f349f0a5dd475041cc7dbf02960a67214f9917da34b4c0d7bacdd839865d31fed8de6
-
SSDEEP
24576:Yw03rS2BK40yMVrs+JBe0pw0H/bap4p16SM7RdkZu3svS/oUfsD:barS2BKOM/JBeYJfFP6SMdd6aRfs
Static task
static1
Behavioral task
behavioral1
Sample
Lcovlccdxd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Lcovlccdxd.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
cheat
194.26.192.248:7053
Targets
-
-
Target
Lcovlccdxd.exe
-
Size
1.2MB
-
MD5
d3713110654dc546bd5edc306a6e7efd
-
SHA1
db266e554e96098584bcbb29aa2774106a7e90bf
-
SHA256
97bfa0bd9f3b382280f67839c650a3d7be16aa31f124810f3a9b9559e34619c6
-
SHA512
35013774da17edf34b0d632766d54a55609d4c68b12da758b26016e5590f349f0a5dd475041cc7dbf02960a67214f9917da34b4c0d7bacdd839865d31fed8de6
-
SSDEEP
24576:Yw03rS2BK40yMVrs+JBe0pw0H/bap4p16SM7RdkZu3svS/oUfsD:barS2BKOM/JBeYJfFP6SMdd6aRfs
-
Detect PureCrypter injector
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-