Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2025, 03:48

General

  • Target

    2025-04-07_f2f15ebacc353c878213af99699b34dc_amadey_rhadamanthys_smoke-loader.exe

  • Size

    691KB

  • MD5

    f2f15ebacc353c878213af99699b34dc

  • SHA1

    716a391fd178103c1745c6513b79130db386e77f

  • SHA256

    2f48dce96a3a36a28a789c89629fc818702a5ba0f3f29e3380a6ff81ddb9d96a

  • SHA512

    51632819df0db968445475defdd17e0d5b2226ea7c102edaf17ced6c4f19fd3eaeb748e732a16876cd9ca0500bcadf7d2214be9ece4a903b1f8e2ad78138e9e8

  • SSDEEP

    12288:sw3zk2EJiICSVtg0wBW3iFt4ONq30/4St2NBd0JoLdaoi9Bbk:swDkNJBbVTb34k30/8dRi9

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-07_f2f15ebacc353c878213af99699b34dc_amadey_rhadamanthys_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-07_f2f15ebacc353c878213af99699b34dc_amadey_rhadamanthys_smoke-loader.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/336-0-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/336-2-0x00000000001C0000-0x00000000001F0000-memory.dmp

    Filesize

    192KB

  • memory/336-5-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/336-6-0x0000000000AE0000-0x0000000000AE6000-memory.dmp

    Filesize

    24KB

  • memory/336-7-0x0000000004C40000-0x0000000005258000-memory.dmp

    Filesize

    6.1MB

  • memory/336-8-0x0000000005260000-0x000000000536A000-memory.dmp

    Filesize

    1.0MB

  • memory/336-9-0x00000000046E0000-0x00000000046F2000-memory.dmp

    Filesize

    72KB

  • memory/336-10-0x0000000005370000-0x00000000053AC000-memory.dmp

    Filesize

    240KB

  • memory/336-11-0x0000000005410000-0x000000000545C000-memory.dmp

    Filesize

    304KB