General
-
Target
ee2caa467f7620302ebbdc3b53eb875bbbdab550c06e0c4704646472b4212c3d
-
Size
915KB
-
Sample
230620-s8amtaeb3x
-
MD5
d7ce55dc4265af15c541ececd6061dfd
-
SHA1
cdbe2fc4f8d0c4a25b0187e4fdaf3397a950e268
-
SHA256
ee2caa467f7620302ebbdc3b53eb875bbbdab550c06e0c4704646472b4212c3d
-
SHA512
62f6b6236a028cff4212e7162c444c6ae82b46b6bfd8b17e442e91b3d795ad9482019de53f8ce598920a5e73984b9eb7d384c585c2a43c455d921ebe822cb299
-
SSDEEP
24576:5ybXObVM4JEuBXornPu3KHFMcO8D+CPm0eA:szcZFAq0F5+v0e
Static task
static1
Behavioral task
behavioral1
Sample
ee2caa467f7620302ebbdc3b53eb875bbbdab550c06e0c4704646472b4212c3d.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
hares
83.97.73.128:19071
-
auth_value
62fed2fd42b168e956200885cefb36a7
Extracted
amadey
3.81
95.214.27.98/cronus/index.php
Extracted
redline
Rocketpro
94.142.138.212:26540
-
auth_value
7ec2b1cebe4360f7f11bb80bbf7d8b26
Targets
-
-
Target
ee2caa467f7620302ebbdc3b53eb875bbbdab550c06e0c4704646472b4212c3d
-
Size
915KB
-
MD5
d7ce55dc4265af15c541ececd6061dfd
-
SHA1
cdbe2fc4f8d0c4a25b0187e4fdaf3397a950e268
-
SHA256
ee2caa467f7620302ebbdc3b53eb875bbbdab550c06e0c4704646472b4212c3d
-
SHA512
62f6b6236a028cff4212e7162c444c6ae82b46b6bfd8b17e442e91b3d795ad9482019de53f8ce598920a5e73984b9eb7d384c585c2a43c455d921ebe822cb299
-
SSDEEP
24576:5ybXObVM4JEuBXornPu3KHFMcO8D+CPm0eA:szcZFAq0F5+v0e
-
Detect rhadamanthys stealer shellcode
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-