General
-
Target
file.exe
-
Size
250KB
-
Sample
230327-qvnleafg3w
-
MD5
18bf796bed3dca32beeea437de1127e3
-
SHA1
d0153f48dda4d62c6dba55955edd2eebef008e13
-
SHA256
e39d66d4711d41ca30da9a9d16376774b4d5a0f106fea8bc943b885da998e00f
-
SHA512
f65b3e99c195881a2d30664684cdb69117bde25d9b516ddfac7a0643b776beb6597e4a3b57a9e290441457ffe6e690e8b8119e30e7bde1a03ed58c08143bd00a
-
SSDEEP
6144:Up4MCykkLckNafcRBInLTwpnGANKfD+EUBuO+:GeykkYkAUvI/XAsJUBup
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
redline
koreamon
koreamonitoring.com:80
-
auth_value
1a0e1a9f491ef3df873a03577dfa10aa
Targets
-
-
Target
file.exe
-
Size
250KB
-
MD5
18bf796bed3dca32beeea437de1127e3
-
SHA1
d0153f48dda4d62c6dba55955edd2eebef008e13
-
SHA256
e39d66d4711d41ca30da9a9d16376774b4d5a0f106fea8bc943b885da998e00f
-
SHA512
f65b3e99c195881a2d30664684cdb69117bde25d9b516ddfac7a0643b776beb6597e4a3b57a9e290441457ffe6e690e8b8119e30e7bde1a03ed58c08143bd00a
-
SSDEEP
6144:Up4MCykkLckNafcRBInLTwpnGANKfD+EUBuO+:GeykkYkAUvI/XAsJUBup
-
Detect rhadamanthys stealer shellcode
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-