General
-
Target
file.exe
-
Size
235KB
-
Sample
230124-r8pw3acb92
-
MD5
eadc21381dc709d986659834e2e4061b
-
SHA1
864eab0d7bd119a7e8158babfda4ca8967c139c6
-
SHA256
43c5942d24457766b0b38d2bf8c78c96fc0389bf06d6f061aa77482e3c64d3ab
-
SHA512
a738868aa3c39b850300a514a8d91ebe94cfc101918304958ceeebc0f65ac8c3176a173f36824769a146a7bcbf1662bcc946dc45d6e6ce8eadb2295379bf8bca
-
SSDEEP
6144:gSRg+A7AZGFDubDXagraG0JzSRuVyLWNg5PQqgE:gPsEjgwJ4uVyCNmPJ
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
amadey
3.66
62.204.41.89/8bcZfjw/index.php
Extracted
redline
nonem
62.204.41.159:4062
-
auth_value
e6c5903bd2c2eaaf10cbbfd1fb675712
Extracted
redline
temp777777777777
82.115.223.9:15486
-
auth_value
39fa6f6612a4320728bfb830f0e86553
Extracted
redline
ringa
62.204.41.159:4062
-
auth_value
a55a3a033d3867d474f0b150e8e5ec10
Extracted
redline
st1
librchichelpai.shop:81
rniwondunuifac.shop:81
-
auth_value
a7232a45d6034ee2454fc434093d8f12
Targets
-
-
Target
file.exe
-
Size
235KB
-
MD5
eadc21381dc709d986659834e2e4061b
-
SHA1
864eab0d7bd119a7e8158babfda4ca8967c139c6
-
SHA256
43c5942d24457766b0b38d2bf8c78c96fc0389bf06d6f061aa77482e3c64d3ab
-
SHA512
a738868aa3c39b850300a514a8d91ebe94cfc101918304958ceeebc0f65ac8c3176a173f36824769a146a7bcbf1662bcc946dc45d6e6ce8eadb2295379bf8bca
-
SSDEEP
6144:gSRg+A7AZGFDubDXagraG0JzSRuVyLWNg5PQqgE:gPsEjgwJ4uVyCNmPJ
-
Detect rhadamanthys stealer shellcode
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-