General
-
Target
file.exe
-
Size
273KB
-
Sample
230325-ys84bsec37
-
MD5
4761630c190797e0c3ebc304a02ac855
-
SHA1
2f1cc6f608ffa0e8d6f9d87048e2c738feb0c7e4
-
SHA256
631649edae809adf365c2def004837945e90c152dd3bc9d2477c86f8d58cb0df
-
SHA512
b57c87fb9e901c22179e403c824f19338cc0c7d30a068e1e1280c7e6680bdc8318c741afcc203bf527308025524fdf13c930d1dcd928962ea6123a0bcf669536
-
SSDEEP
3072:CA+Vl0aLHRoi3FALvEjT78+mMbAkcVM5BB9Jh/LWK5vLOkisj/YhBSCJQN0fm2Rh:yhoiVd78+3rLWK5jHi/VTfz
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
redline
koreamon
koreamonitoring.com:80
-
auth_value
1a0e1a9f491ef3df873a03577dfa10aa
Targets
-
-
Target
file.exe
-
Size
273KB
-
MD5
4761630c190797e0c3ebc304a02ac855
-
SHA1
2f1cc6f608ffa0e8d6f9d87048e2c738feb0c7e4
-
SHA256
631649edae809adf365c2def004837945e90c152dd3bc9d2477c86f8d58cb0df
-
SHA512
b57c87fb9e901c22179e403c824f19338cc0c7d30a068e1e1280c7e6680bdc8318c741afcc203bf527308025524fdf13c930d1dcd928962ea6123a0bcf669536
-
SSDEEP
3072:CA+Vl0aLHRoi3FALvEjT78+mMbAkcVM5BB9Jh/LWK5vLOkisj/YhBSCJQN0fm2Rh:yhoiVd78+3rLWK5jHi/VTfz
-
Detect rhadamanthys stealer shellcode
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-