General
-
Target
travelpeov.mal
-
Size
193.2MB
-
Sample
230211-zvs1kahf3s
-
MD5
2928f4a10f1a824d26f56052accd9926
-
SHA1
93af9c82a7dedef40f3ab1b1a6a414210d90c192
-
SHA256
125df6f2b9f5445123c888a654df37e3bc185adb45e94e79b1e44627b1cbf65a
-
SHA512
4bd74f377bbd9ab41dd5fe0448a2d77e062a795b6e30a5961e2b62c70d5f1c35a470fe9a7cdbc313f40f8fbda086935e02677ba05213689bcec3b58eef5ea3e2
-
SSDEEP
96:eSwqiJBpnpML3uibpR3KbofKkor74BzNt:eBpnsLRPwof3oXu
Static task
static1
Behavioral task
behavioral1
Sample
travelpeov.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
travelpeov.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
purecrypter
https://www.franceconsobanque.fr/wp-admin/images/css/design/fabric/bo/Sjbgpxzi.bmp
Extracted
redline
@gestaslinoff
45.15.157.131:36457
-
auth_value
95adc00b732fc138a3ecc231c485a57a
Targets
-
-
Target
travelpeov.mal
-
Size
193.2MB
-
MD5
2928f4a10f1a824d26f56052accd9926
-
SHA1
93af9c82a7dedef40f3ab1b1a6a414210d90c192
-
SHA256
125df6f2b9f5445123c888a654df37e3bc185adb45e94e79b1e44627b1cbf65a
-
SHA512
4bd74f377bbd9ab41dd5fe0448a2d77e062a795b6e30a5961e2b62c70d5f1c35a470fe9a7cdbc313f40f8fbda086935e02677ba05213689bcec3b58eef5ea3e2
-
SSDEEP
96:eSwqiJBpnpML3uibpR3KbofKkor74BzNt:eBpnsLRPwof3oXu
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-