General
-
Target
1df95ebb57c93ce4374ff3ba6fcdad3662af67015abade8925c242a04e1b6b6c
-
Size
5.9MB
-
Sample
241110-ay91taylck
-
MD5
71a0508bf75b1b3f84606026ca9dd764
-
SHA1
dbb4dd16882685410e70b1babfaf6b832be4183a
-
SHA256
1df95ebb57c93ce4374ff3ba6fcdad3662af67015abade8925c242a04e1b6b6c
-
SHA512
c44509540183529e3fefbc50d92a93356fb891483712c8500eac818e7c7ec2cb85eea51aebdcc3043e6067a2abd3cdc1d90148047808f26f9883beccf751b60d
-
SSDEEP
98304:h1Nwt0IdVFLa+CWaPknoMiIgSLr/e9Yo0Pa7Re+P9sZ5QH/i0tu1S9Qnlr8ik1Xz:G9fVDaPknBiBSLy91t7RpgRns9Qlwx1D
Static task
static1
Behavioral task
behavioral1
Sample
DATA PROTECTION/combase.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DATA PROTECTION/combase.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DATA PROTECTION/freebl3.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
DATA PROTECTION/freebl3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
npp.8.4.1.Installer.x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
npp.8.4.1.Installer.x64.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
Notepad_2
194.36.177.124:39456
-
auth_value
37464cc4dd294b9925a8c1092e1c72a9
Targets
-
-
Target
DATA PROTECTION/combase.dll
-
Size
2.1MB
-
MD5
65441ddd17d8f99b37b9716412415940
-
SHA1
23aaaec781f3f81bbb65470944c060e973b6e995
-
SHA256
c5a6f11a839ad1e46983ddbef1f697e17e1f64ba80d388f6d7392461ddd90a9e
-
SHA512
e04496ce8373021a586f31abffcbad46d159a3e70ac06c57416be7c413a7d7a93d12d7777e068a1575156699c2fd6ca1e53a40ba6d61f9137dfa62c720aacb69
-
SSDEEP
49152:qYbdzuV9mMWdJKyzaBUPQ/MQ+emp+jhS6o:q8IydJzzgaX9p+u
Score1/10 -
-
-
Target
DATA PROTECTION/freebl3.dll
-
Size
741KB
-
MD5
f70594c50cfdddcb73690f9fa3d79f37
-
SHA1
290157ea262756a5c9bafc8bbba46d6a9a0c9d10
-
SHA256
8bb27eeb3481cf8e13d27c5599176e80976231d6b1b9c956af121740d3839858
-
SHA512
3f6dc0582ec99d4d05ed6dbe47111e123858e404e3a78891c6593ce582578632cf717ce2cb4010297130fd0cdf297f7923429c37498945df765b51ec086dde14
-
SSDEEP
12288:IP+3NkvK0MwtS2ZZELO173ycCZ0Kt3FjjwRwlbwgUfZmLqnhw:IPmkPMwtYLi7ycCZ0KNFjjwRwlcrfS+K
Score1/10 -
-
-
Target
npp.8.4.1.Installer.x64.exe
-
Size
700.0MB
-
MD5
9a2c573e882d31251e1bcd07ba90585f
-
SHA1
d46878f2ad28df08972371a617bce73ae623523c
-
SHA256
d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e
-
SHA512
40ac3d1cca6bb8eb7ccfb0d1ae0467423b0355ee5cded84b1095a284f08cecbd70325b808df933d47a7af60081470ad71ee1021e724759227379052302ff3894
-
SSDEEP
98304:h9eCUTzzphq1G/jxZIo0YYUOJimJJQYts5JcyTcvg6BtufkCJ:PefTzVhqpP9JvgpTcvf7ufz
-
Detect PureCrypter injector
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-