General
-
Target
8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe
-
Size
560KB
-
Sample
230806-wg8x3sbd65
-
MD5
5090da2bd37fd95420f9af41e019c563
-
SHA1
6aa40d70dc932448801a97141f0381b102c32ce6
-
SHA256
8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100
-
SHA512
f3b1d83031fe525cbcb3a2f571f6a544f56716cd3c9e1bb578680cf0e837e9cdb762326eb89e5ef2317627c02035f984cf0fe5f6fb06fe3a1d32e813f865a04f
-
SSDEEP
12288:gMrEy90DAH0cguNlYg5i3fAHZk2SZtIyhPNiv3i0DZQ:UyC3gYg5i3oHZktIypNGyJ
Static task
static1
Behavioral task
behavioral1
Sample
8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Targets
-
-
Target
8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100exe_JC.exe
-
Size
560KB
-
MD5
5090da2bd37fd95420f9af41e019c563
-
SHA1
6aa40d70dc932448801a97141f0381b102c32ce6
-
SHA256
8f42370dcef5beb7749b11d58e6b425e38c55b0cb788dd02eb3ea5e613430100
-
SHA512
f3b1d83031fe525cbcb3a2f571f6a544f56716cd3c9e1bb578680cf0e837e9cdb762326eb89e5ef2317627c02035f984cf0fe5f6fb06fe3a1d32e813f865a04f
-
SSDEEP
12288:gMrEy90DAH0cguNlYg5i3fAHZk2SZtIyhPNiv3i0DZQ:UyC3gYg5i3oHZktIypNGyJ
-
Detect rhadamanthys stealer shellcode
-
Detects Healer an antivirus disabler dropper
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1