General
-
Target
Crunchyroll Checker by xRisky.exe
-
Size
2.2MB
-
Sample
240805-vzydmawhlb
-
MD5
c1569f6f8a566286be9c1462a45439f0
-
SHA1
495666664562a811021e044228917b25a8a9c0b6
-
SHA256
34c5044ae9b4eaea508f2444a2bdc861b5baef9839950e7f0ac8f478119b7923
-
SHA512
0fb49a006c99c59bb5b55df40a108bdff3cbe01830af5ce051c61fff1a631ea8fdb8153aa7bb0739415fe97fbf67830c3c3228f901e8b2c9f0c39f2cda1e135f
-
SSDEEP
49152:gRArNHv39/gvqDZEsLXN4c1ILuo2iue915Y:4uNHvt/lEe0uo21e9
Static task
static1
Behavioral task
behavioral1
Sample
Crunchyroll Checker by xRisky.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Crunchyroll Checker by xRisky.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Crunchyroll Checker by xRisky.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Crunchyroll Checker by xRisky.exe
Resource
win11-20240802-en
Malware Config
Extracted
redline
UltimateCrackPack
51.83.170.23:16128
Targets
-
-
Target
Crunchyroll Checker by xRisky.exe
-
Size
2.2MB
-
MD5
c1569f6f8a566286be9c1462a45439f0
-
SHA1
495666664562a811021e044228917b25a8a9c0b6
-
SHA256
34c5044ae9b4eaea508f2444a2bdc861b5baef9839950e7f0ac8f478119b7923
-
SHA512
0fb49a006c99c59bb5b55df40a108bdff3cbe01830af5ce051c61fff1a631ea8fdb8153aa7bb0739415fe97fbf67830c3c3228f901e8b2c9f0c39f2cda1e135f
-
SSDEEP
49152:gRArNHv39/gvqDZEsLXN4c1ILuo2iue915Y:4uNHvt/lEe0uo21e9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2