Overview
overview
10Static
static
3ttcopy.exe
windows10-2004-x64
10ttcopy.exe
windows10-2004-x64
10ttcopy.exe
windows10-ltsc_2021-x64
10ttcopy.exe
windows11-21h2-x64
10ttcopy.exe
android-10-x64
ttcopy.exe
android-13-x64
ttcopy.exe
macos-10.15-amd64
ttcopy.exe
ubuntu-18.04-amd64
ttcopy.exe
debian-9-armhf
ttcopy.exe
debian-9-mips
ttcopy.exe
debian-9-mipsel
General
-
Target
ttcopy.exe
-
Size
1.4MB
-
Sample
250331-twelnsttd1
-
MD5
eace0039dd2f8fb2a963b0cf8208b8ed
-
SHA1
3c9095b0e6b423b17abb966bc2dce7092a05fe70
-
SHA256
3e66d72e6cb4fab3bf03a7a1ba048e661b9669928a021140d4d0cde12ced097f
-
SHA512
eaf1ffb532deda9424cbfb3655dbe423f6e0ec289dd7eeec02714eef516e068c0fa15c914fc69f146d5d9a3839b6a34d2a81925953c66b4b0252ae28c7345135
-
SSDEEP
12288:p2hhDcnbPxuhAjGSJTRQ2b+pth7BmwE5Td3o:MEbPAhAiSJTRQ2bSthtmwEp6
Static task
static1
Behavioral task
behavioral1
Sample
ttcopy.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
ttcopy.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
ttcopy.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
ttcopy.exe
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
ttcopy.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
ttcopy.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral7
Sample
ttcopy.exe
Resource
macos-20241101-en
Behavioral task
behavioral8
Sample
ttcopy.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral9
Sample
ttcopy.exe
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral10
Sample
ttcopy.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral11
Sample
ttcopy.exe
Resource
debian9-mipsel-20240611-en
Malware Config
Extracted
redline
cheat
103.168.67.29:6677
Targets
-
-
Target
ttcopy.exe
-
Size
1.4MB
-
MD5
eace0039dd2f8fb2a963b0cf8208b8ed
-
SHA1
3c9095b0e6b423b17abb966bc2dce7092a05fe70
-
SHA256
3e66d72e6cb4fab3bf03a7a1ba048e661b9669928a021140d4d0cde12ced097f
-
SHA512
eaf1ffb532deda9424cbfb3655dbe423f6e0ec289dd7eeec02714eef516e068c0fa15c914fc69f146d5d9a3839b6a34d2a81925953c66b4b0252ae28c7345135
-
SSDEEP
12288:p2hhDcnbPxuhAjGSJTRQ2b+pth7BmwE5Td3o:MEbPAhAiSJTRQ2bSthtmwEp6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-