General
-
Target
0x00070000000134d4-2007.dat
-
Size
239KB
-
Sample
230301-wf55ssgh6y
-
MD5
2d61bf8f763bbfe959638e319ec81de7
-
SHA1
7f55050ba4b88a1b4aeb792d7fc85df4286309f1
-
SHA256
3dbde06db2b13e49f2411d4b4eb0fa37c99dcf4c82ef8d709bb86ce435c2f49d
-
SHA512
2f8107920e6af45b94774f150cc1014ae35c55606bb3501b2621f38edb46847055544bb7c46286db731e060ba44b62f8b545cfbe512de734cafb57531e445a91
-
SSDEEP
6144:u6f3mSV2p10caphMnboArJMuVyhpLT7FC2y8nU:uTb0caE0A2uVybLT7FChd
Behavioral task
behavioral1
Sample
0x00070000000134d4-2007.exe
Resource
win7-20230220-en
Malware Config
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
amadey
3.66
62.204.41.88/9vdVVVjsw/index.php
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Targets
-
-
Target
0x00070000000134d4-2007.dat
-
Size
239KB
-
MD5
2d61bf8f763bbfe959638e319ec81de7
-
SHA1
7f55050ba4b88a1b4aeb792d7fc85df4286309f1
-
SHA256
3dbde06db2b13e49f2411d4b4eb0fa37c99dcf4c82ef8d709bb86ce435c2f49d
-
SHA512
2f8107920e6af45b94774f150cc1014ae35c55606bb3501b2621f38edb46847055544bb7c46286db731e060ba44b62f8b545cfbe512de734cafb57531e445a91
-
SSDEEP
6144:u6f3mSV2p10caphMnboArJMuVyhpLT7FC2y8nU:uTb0caE0A2uVybLT7FChd
-
Detect rhadamanthys stealer shellcode
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Downloads MZ/PE file
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
2Modify Registry
3Virtualization/Sandbox Evasion
4