General
-
Target
594799c0954909a57334da81f783f46dcdbf8e275f85376f4e924c0db9629536
-
Size
1.9MB
-
Sample
241105-hf58xayqej
-
MD5
bd061f324fe93a101194c1233d731cc9
-
SHA1
59613b072c8755d17b22e0d4d908021708545088
-
SHA256
594799c0954909a57334da81f783f46dcdbf8e275f85376f4e924c0db9629536
-
SHA512
92f885ea4f332bdb6f25261d32eac13fd632ce1f4ece48a82d15e47d5f0fd248a41c715d0853bf9ce67208d839c006bcf2d19a0e9057d140acf99ec1f593e715
-
SSDEEP
24576:lWYifwafT73ARA3/bSonGxysx/Z2e91kOZg18wcG4TgCcmYsruug:lidT4wXWwr98NTgCpdvg
Static task
static1
Behavioral task
behavioral1
Sample
594799c0954909a57334da81f783f46dcdbf8e275f85376f4e924c0db9629536.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
594799c0954909a57334da81f783f46dcdbf8e275f85376f4e924c0db9629536.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
PPILAB_20230110
179.43.175.174:80
-
auth_value
0b4817e037a97cddb9de49b467d5e0e3
Extracted
rhadamanthys
http://109.206.243.168/upload/libcurl.dll
Targets
-
-
Target
594799c0954909a57334da81f783f46dcdbf8e275f85376f4e924c0db9629536
-
Size
1.9MB
-
MD5
bd061f324fe93a101194c1233d731cc9
-
SHA1
59613b072c8755d17b22e0d4d908021708545088
-
SHA256
594799c0954909a57334da81f783f46dcdbf8e275f85376f4e924c0db9629536
-
SHA512
92f885ea4f332bdb6f25261d32eac13fd632ce1f4ece48a82d15e47d5f0fd248a41c715d0853bf9ce67208d839c006bcf2d19a0e9057d140acf99ec1f593e715
-
SSDEEP
24576:lWYifwafT73ARA3/bSonGxysx/Z2e91kOZg18wcG4TgCcmYsruug:lidT4wXWwr98NTgCpdvg
-
Detect rhadamanthys stealer shellcode
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-