General
-
Target
file.exe
-
Size
251KB
-
Sample
230327-r6ey3sga4y
-
MD5
28676ee6929ed8b6d7082851f6933bc7
-
SHA1
f391a10869df832a3942b6f3dec017819c5d2e1d
-
SHA256
58cc5482d7de511b7adc6819c858b1c6de067fec262813396e0f580ada1e1ecd
-
SHA512
4a47a0b4d04a0bb1ca49f77d3f653bcb4021368f3be1385022314ab48d4e8a6d5b8a32af727cca9d389794b3cf01afc028c7f92fce6587e981312e1c286d9978
-
SSDEEP
3072:01XwHn5/TE2zdkzLuw/y0/IUIOIMzZ/4+DeuYOXSGEreU23ReOAj5qdqDb:cAHC2RkzLj/d/IKLxAreU23Ms4
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
redline
koreamon
koreamonitoring.com:80
-
auth_value
1a0e1a9f491ef3df873a03577dfa10aa
Targets
-
-
Target
file.exe
-
Size
251KB
-
MD5
28676ee6929ed8b6d7082851f6933bc7
-
SHA1
f391a10869df832a3942b6f3dec017819c5d2e1d
-
SHA256
58cc5482d7de511b7adc6819c858b1c6de067fec262813396e0f580ada1e1ecd
-
SHA512
4a47a0b4d04a0bb1ca49f77d3f653bcb4021368f3be1385022314ab48d4e8a6d5b8a32af727cca9d389794b3cf01afc028c7f92fce6587e981312e1c286d9978
-
SSDEEP
3072:01XwHn5/TE2zdkzLuw/y0/IUIOIMzZ/4+DeuYOXSGEreU23ReOAj5qdqDb:cAHC2RkzLj/d/IKLxAreU23Ms4
-
Detect rhadamanthys stealer shellcode
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-