General
-
Target
ca60a396915eb96aa8b5f7a0c5ff07f8.bin
-
Size
167KB
-
Sample
230326-cd1bzshb51
-
MD5
cc40340433c0e3e669b66a761bc77bd6
-
SHA1
fa78e57b4dff32794b1551a5d20fa213b97e55a4
-
SHA256
0c0a0bacac6f97f343c96df99f474cfeae3bdaa549b43eccdcf520ad893d3a7c
-
SHA512
1545169819154fa0fbaaa8339eee6a63ab6444bc6257d9ce114221dac75291c9893f4b25e3784df635b0299c13a2c9ad6105433e5714e1c9b2c0aa92f584cebc
-
SSDEEP
3072:lyCPboZk8oBmEZOP03udCMTLB8RdX0q2P9ltdteyJN:lBTsk8umEUSsCMPK3EVPJN
Static task
static1
Behavioral task
behavioral1
Sample
2a05b42d2c3c8b84d7e5343ba39030b16004622607ef49a11d75249d3a8a03b8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2a05b42d2c3c8b84d7e5343ba39030b16004622607ef49a11d75249d3a8a03b8.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
redline
koreamon
koreamonitoring.com:80
-
auth_value
1a0e1a9f491ef3df873a03577dfa10aa
Targets
-
-
Target
2a05b42d2c3c8b84d7e5343ba39030b16004622607ef49a11d75249d3a8a03b8.exe
-
Size
276KB
-
MD5
ca60a396915eb96aa8b5f7a0c5ff07f8
-
SHA1
19ca5be22c6b07418a18aa93931d41a0b11c3b9e
-
SHA256
2a05b42d2c3c8b84d7e5343ba39030b16004622607ef49a11d75249d3a8a03b8
-
SHA512
c487b8803e3eae896483075819738954c611330021ad6d9fa5b4ff8bfab380836eb7ab73edbc7ad2f24e08da170e9c11f1262305f0e6a36f5663eaf63462ca2e
-
SSDEEP
3072:oxkfN82xxRYCCd5kxUlfCDmDdZzlzxnsdJFqwWNb2oaqR0d2KWN8aeeL:Uw2cY/fCDAlzxdDJ2/qR0sKva
-
Detect rhadamanthys stealer shellcode
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-