General
-
Target
Remove Duplicates by xRisky v1.exe
-
Size
547KB
-
Sample
240805-xe665svdkr
-
MD5
731e0addfe7c32066783fa33db494eff
-
SHA1
29f628362813b3b03c1eaae29d8230c3bc4485ab
-
SHA256
0d6d468d9d9595fc896559f15537a58bc006ebe8470fffcad933cede58731dbe
-
SHA512
6dbb7fb9bb29c45011ad6017d3e7db928079888d85d9d32eef6b816e7350a49b5df3c47f7ae71ca2e829e95f3ecc2205dad48e29a011a71f557b44fdfa2ad949
-
SSDEEP
12288:sfhF1ROYYCrqEp3fWhcueuF16B1ROmYnHglvlynf/y8:6cVMp3uRbF2EHgVlAf
Static task
static1
Behavioral task
behavioral1
Sample
Remove Duplicates by xRisky v1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Remove Duplicates by xRisky v1.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
UltimateCrackPack
51.83.170.23:16128
Targets
-
-
Target
Remove Duplicates by xRisky v1.exe
-
Size
547KB
-
MD5
731e0addfe7c32066783fa33db494eff
-
SHA1
29f628362813b3b03c1eaae29d8230c3bc4485ab
-
SHA256
0d6d468d9d9595fc896559f15537a58bc006ebe8470fffcad933cede58731dbe
-
SHA512
6dbb7fb9bb29c45011ad6017d3e7db928079888d85d9d32eef6b816e7350a49b5df3c47f7ae71ca2e829e95f3ecc2205dad48e29a011a71f557b44fdfa2ad949
-
SSDEEP
12288:sfhF1ROYYCrqEp3fWhcueuF16B1ROmYnHglvlynf/y8:6cVMp3uRbF2EHgVlAf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-