Analysis
-
max time kernel
104s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader.exe
-
Size
282KB
-
MD5
46b9d887b4702263cdbddfea57eeca8e
-
SHA1
28fbe23677c1a9bf3f76ce5b74450795f2b6972a
-
SHA256
f70d2be11332753f0cf5c52822b248f70debdcb49da5295011b6de33f4fa2d47
-
SHA512
2edfd8648c123da57f664e1e2a91523502f0cc899397cbb719609de48f96ef92bd96df9df682fa4228db3af45497df419695c187dd6e7ed3f1deb96fe6f42be6
-
SSDEEP
3072:E/KHdcqCW0fvkZJi4v02Uo5jduu8goVsP1S3rVeXQRjihbuZqWzQ/CDF9n+rVyz+:eK9GW0SwEdNU283PghbmqSHDvGVyph
Malware Config
Extracted
redline
@Chicago
185.81.68.115:2920
-
auth_value
624a75e46c4217bc2cafb7758d1978d9
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2172-5-0x0000000002890000-0x00000000028BC000-memory.dmp family_redline behavioral1/memory/2172-7-0x0000000004E00000-0x0000000004E28000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2172