General
-
Target
tmp
-
Size
1.3MB
-
Sample
230513-rpstlsaf9v
-
MD5
6c2a5008f01ea5fc51e70e0e775883e8
-
SHA1
90ed4866379e35c2a20e6e862c56df753e95e5df
-
SHA256
d90cc5d953f48c18660bad6edafd3f1f5fb03756f8558fc349dfec4418c14b96
-
SHA512
a2cd3d64a24470d05fb7435e019946a713a87da8dd6bb45bec773e71394dc374be0f7fb73c961ebebf341bf794ff7553e5a0bff37f83e442604f88279dc623de
-
SSDEEP
24576:dPKpTbfbpfF0mrA6TI2MH6pbHqnq3byxHJ1jh/GvFf/Qw+oRCpd:dCJtFk6TIi573UHrF+32pd
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
TPB-ACTIVATOR
amrican-sport-live-stream.cc:4581
-
auth_value
df7c91432437b11d8f25d54ba7832b8d
Targets
-
-
Target
tmp
-
Size
1.3MB
-
MD5
6c2a5008f01ea5fc51e70e0e775883e8
-
SHA1
90ed4866379e35c2a20e6e862c56df753e95e5df
-
SHA256
d90cc5d953f48c18660bad6edafd3f1f5fb03756f8558fc349dfec4418c14b96
-
SHA512
a2cd3d64a24470d05fb7435e019946a713a87da8dd6bb45bec773e71394dc374be0f7fb73c961ebebf341bf794ff7553e5a0bff37f83e442604f88279dc623de
-
SSDEEP
24576:dPKpTbfbpfF0mrA6TI2MH6pbHqnq3byxHJ1jh/GvFf/Qw+oRCpd:dCJtFk6TIi573UHrF+32pd
-
Detect PureCrypter injector
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-