General
-
Target
Steam API Cracker Coded by MR.ViPER - v3.0.exe
-
Size
1.3MB
-
Sample
240805-wtql9sxflg
-
MD5
ede94ce030138adae8f518b53dd15f9a
-
SHA1
3c5b045035f3a5c1311207ec3d6cfa9a58e5b67f
-
SHA256
6cb97e0b5df68aed88d5311bbc0db32da525fdb8b4e9771f4197bbf180d0b7f8
-
SHA512
58fd4de628b232c3387ce85060fa2bf13ca01f25af27d66c430cb20df405ca670d14129ad084b8078b5494e99be4155a57eac9d1f3454d7a4608bfd880500753
-
SSDEEP
24576:1WpYXFJAgw/dn/ZY4trYPJ3jj4u0lu7SInx0SHnLqk2j0QjzVxbsuHtyRpz:0eXF+gUJx7sh3H4usu7LdLqk2jTjXsum
Static task
static1
Behavioral task
behavioral1
Sample
Steam API Cracker Coded by MR.ViPER - v3.0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Steam API Cracker Coded by MR.ViPER - v3.0.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
UltimateCrackPack
51.83.170.23:16128
Targets
-
-
Target
Steam API Cracker Coded by MR.ViPER - v3.0.exe
-
Size
1.3MB
-
MD5
ede94ce030138adae8f518b53dd15f9a
-
SHA1
3c5b045035f3a5c1311207ec3d6cfa9a58e5b67f
-
SHA256
6cb97e0b5df68aed88d5311bbc0db32da525fdb8b4e9771f4197bbf180d0b7f8
-
SHA512
58fd4de628b232c3387ce85060fa2bf13ca01f25af27d66c430cb20df405ca670d14129ad084b8078b5494e99be4155a57eac9d1f3454d7a4608bfd880500753
-
SSDEEP
24576:1WpYXFJAgw/dn/ZY4trYPJ3jj4u0lu7SInx0SHnLqk2j0QjzVxbsuHtyRpz:0eXF+gUJx7sh3H4usu7LdLqk2jTjXsum
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-