Analysis

  • max time kernel
    104s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2025, 07:41

General

  • Target

    2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader.exe

  • Size

    282KB

  • MD5

    46b9d887b4702263cdbddfea57eeca8e

  • SHA1

    28fbe23677c1a9bf3f76ce5b74450795f2b6972a

  • SHA256

    f70d2be11332753f0cf5c52822b248f70debdcb49da5295011b6de33f4fa2d47

  • SHA512

    2edfd8648c123da57f664e1e2a91523502f0cc899397cbb719609de48f96ef92bd96df9df682fa4228db3af45497df419695c187dd6e7ed3f1deb96fe6f42be6

  • SSDEEP

    3072:E/KHdcqCW0fvkZJi4v02Uo5jduu8goVsP1S3rVeXQRjihbuZqWzQ/CDF9n+rVyz+:eK9GW0SwEdNU283PghbmqSHDvGVyph

Malware Config

Extracted

Family

redline

Botnet

@Chicago

C2

185.81.68.115:2920

Attributes
  • auth_value

    624a75e46c4217bc2cafb7758d1978d9

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-06_46b9d887b4702263cdbddfea57eeca8e_amadey_rhadamanthys_smoke-loader.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2172-1-0x00000000007C0000-0x00000000008C0000-memory.dmp

    Filesize

    1024KB

  • memory/2172-2-0x0000000002460000-0x000000000249D000-memory.dmp

    Filesize

    244KB

  • memory/2172-3-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2172-4-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2172-5-0x0000000002890000-0x00000000028BC000-memory.dmp

    Filesize

    176KB

  • memory/2172-6-0x0000000004E90000-0x0000000005434000-memory.dmp

    Filesize

    5.6MB

  • memory/2172-7-0x0000000004E00000-0x0000000004E28000-memory.dmp

    Filesize

    160KB

  • memory/2172-8-0x0000000005440000-0x00000000054D2000-memory.dmp

    Filesize

    584KB

  • memory/2172-9-0x00000000007C0000-0x00000000008C0000-memory.dmp

    Filesize

    1024KB

  • memory/2172-10-0x0000000002460000-0x000000000249D000-memory.dmp

    Filesize

    244KB

  • memory/2172-11-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2172-13-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2172-14-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB