General
-
Target
7264b4bf4517ed0567dda8ebbcd992384a67f37d1d9f9c9eb8e93d6c99a8227b
-
Size
601KB
-
Sample
230204-vsqefadh46
-
MD5
d6156a2aa357f7da8f125fe74773ee30
-
SHA1
fc4a072289a7cfd77c0a85a597969f5571ddce16
-
SHA256
7264b4bf4517ed0567dda8ebbcd992384a67f37d1d9f9c9eb8e93d6c99a8227b
-
SHA512
19b92b4562e37049b5526ef25ad7e8f93b4e81d14d25449affecde142c77cedb650e77d59a74694021f3982ca2287209d23c50b147bb82a5a9c00ccad38c03be
-
SSDEEP
12288:uRIU61V8a8QR4gN2cy/vLYEg+u6q/CmI181atM60VWsgavVGI06A72Uhp:u4r4gGvrdu2TKwMYPavVtA72Uhp
Static task
static1
Behavioral task
behavioral1
Sample
7264b4bf4517ed0567dda8ebbcd992384a67f37d1d9f9c9eb8e93d6c99a8227b.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
redko
62.204.41.170:4179
-
auth_value
9bcf7b0620ff067017d66b9a5d80b547
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Extracted
redline
temposs6678
82.115.223.9:15486
-
auth_value
af399e6a2fe66f67025541cf71c64313
Extracted
redline
ringo
176.113.115.16:4122
-
auth_value
b8f864b25d84b5ed5591e4bfa647cdbe
Extracted
redline
ringo1
176.113.115.16:4122
-
auth_value
373b070fb57b7689445f097000cbd6c2
Targets
-
-
Target
7264b4bf4517ed0567dda8ebbcd992384a67f37d1d9f9c9eb8e93d6c99a8227b
-
Size
601KB
-
MD5
d6156a2aa357f7da8f125fe74773ee30
-
SHA1
fc4a072289a7cfd77c0a85a597969f5571ddce16
-
SHA256
7264b4bf4517ed0567dda8ebbcd992384a67f37d1d9f9c9eb8e93d6c99a8227b
-
SHA512
19b92b4562e37049b5526ef25ad7e8f93b4e81d14d25449affecde142c77cedb650e77d59a74694021f3982ca2287209d23c50b147bb82a5a9c00ccad38c03be
-
SSDEEP
12288:uRIU61V8a8QR4gN2cy/vLYEg+u6q/CmI181atM60VWsgavVGI06A72Uhp:u4r4gGvrdu2TKwMYPavVtA72Uhp
-
Detect rhadamanthys stealer shellcode
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-