General
-
Target
Crunchyroll Checker by xRisky.exe
-
Size
2.2MB
-
Sample
240805-v5z5eaxakf
-
MD5
c1569f6f8a566286be9c1462a45439f0
-
SHA1
495666664562a811021e044228917b25a8a9c0b6
-
SHA256
34c5044ae9b4eaea508f2444a2bdc861b5baef9839950e7f0ac8f478119b7923
-
SHA512
0fb49a006c99c59bb5b55df40a108bdff3cbe01830af5ce051c61fff1a631ea8fdb8153aa7bb0739415fe97fbf67830c3c3228f901e8b2c9f0c39f2cda1e135f
-
SSDEEP
49152:gRArNHv39/gvqDZEsLXN4c1ILuo2iue915Y:4uNHvt/lEe0uo21e9
Static task
static1
Behavioral task
behavioral1
Sample
Crunchyroll Checker by xRisky.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Crunchyroll Checker by xRisky.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
UltimateCrackPack
51.83.170.23:16128
Targets
-
-
Target
Crunchyroll Checker by xRisky.exe
-
Size
2.2MB
-
MD5
c1569f6f8a566286be9c1462a45439f0
-
SHA1
495666664562a811021e044228917b25a8a9c0b6
-
SHA256
34c5044ae9b4eaea508f2444a2bdc861b5baef9839950e7f0ac8f478119b7923
-
SHA512
0fb49a006c99c59bb5b55df40a108bdff3cbe01830af5ce051c61fff1a631ea8fdb8153aa7bb0739415fe97fbf67830c3c3228f901e8b2c9f0c39f2cda1e135f
-
SSDEEP
49152:gRArNHv39/gvqDZEsLXN4c1ILuo2iue915Y:4uNHvt/lEe0uo21e9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-