General
-
Target
361dda6d1052d40b13116e82e39e6e572bf6f10e838809053409e4f2c7adc779.zip
-
Size
1001KB
-
Sample
230321-rvw38aah96
-
MD5
8c616746d931d7d1ebc6d38f79042dbd
-
SHA1
7a1490699a1024fe6abddfc17fac5704288a8a51
-
SHA256
1986ce42772cf422f1d2da38a071eeb282c805ce5a65fb13dcc04b7c2d9077a5
-
SHA512
ea1bc62a56004142c7493eb21e00cc18a85385a2c0ddf5c511a8e7877d61b7c6f41126f331bfba528363480831e3c595f183df9a30f89b4c597f4e539a3bfa30
-
SSDEEP
24576:Y6+A2xSHeHH88od9CnBHYZ6anJx7LnLO28y9X6+PcrscmY:YKeng6nB43nJxXLWhrz3
Static task
static1
Behavioral task
behavioral1
Sample
361dda6d1052d40b13116e82e39e6e572bf6f10e838809053409e4f2c7adc779.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
361dda6d1052d40b13116e82e39e6e572bf6f10e838809053409e4f2c7adc779.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
https://www.mdegmm.com/pdf/debug2.ps1
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Targets
-
-
Target
361dda6d1052d40b13116e82e39e6e572bf6f10e838809053409e4f2c7adc779.exe
-
Size
1.0MB
-
MD5
d7c5cd06143cd8e4aadf95c82935fd7e
-
SHA1
849944420ea326c6a6408d28cd7abbf2235df00e
-
SHA256
361dda6d1052d40b13116e82e39e6e572bf6f10e838809053409e4f2c7adc779
-
SHA512
7eea7bf9286bbad36e081aef339da1b55484653bbd29189fcd7ea40a5e6f58fe4382fb556316ff4714a39ca610cec40d14851cb63f8274ecaf540509e64822f0
-
SSDEEP
12288:CMrAy90zDuRyulLJ1Cx5nRDGwGTyUg5IstMm+Tg5EDdU2stNXH62IxZ+513l6I7z:Oy0MyulTi5i2UzkER7uXa1ZQP2cR5
-
Detect rhadamanthys stealer shellcode
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Looks for VMWare Tools registry key
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
4Disabling Security Tools
2Virtualization/Sandbox Evasion
4Install Root Certificate
1