General
-
Target
8f04f8e4f87a7e19053f745b6fbcb795.exe
-
Size
2.4MB
-
Sample
230311-nmp36ahd27
-
MD5
8f04f8e4f87a7e19053f745b6fbcb795
-
SHA1
5207f1704c26b19ab175882ab03a13aa42f88f48
-
SHA256
3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4
-
SHA512
89d372996ecf01293d69267b4c151e59a4dca3968c9f28d5795d620a45232b2ccd3aa29aa87eb540c44d06541d90dbfd5c020c77a0d850e5a4f0eee063a9fe5a
-
SSDEEP
49152:Lp7dJRVGJ0vXg055FGLXBFC/tU6aqws96MayXjq7262LMJfS4h1Y:Lp7dJR0+vXg055FSXBFC1gq9kM3zm0MG
Static task
static1
Behavioral task
behavioral1
Sample
8f04f8e4f87a7e19053f745b6fbcb795.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8f04f8e4f87a7e19053f745b6fbcb795.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
red1
34.141.168.40:80
34.125.68.133:80
-
auth_value
70f607e482f39051bebe438c28d43e46
Targets
-
-
Target
8f04f8e4f87a7e19053f745b6fbcb795.exe
-
Size
2.4MB
-
MD5
8f04f8e4f87a7e19053f745b6fbcb795
-
SHA1
5207f1704c26b19ab175882ab03a13aa42f88f48
-
SHA256
3944a1d4b4fdf0b1a5aecaa579a3c9acac4536544b440acc8362d456f46d3cb4
-
SHA512
89d372996ecf01293d69267b4c151e59a4dca3968c9f28d5795d620a45232b2ccd3aa29aa87eb540c44d06541d90dbfd5c020c77a0d850e5a4f0eee063a9fe5a
-
SSDEEP
49152:Lp7dJRVGJ0vXg055FGLXBFC/tU6aqws96MayXjq7262LMJfS4h1Y:Lp7dJR0+vXg055FSXBFC1gq9kM3zm0MG
-
Detect PureCrypter injector
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-