General
-
Target
2025-04-24_82647830e2a98644a2866139e43d6255_amadey_elex_floxif_redline-stealer_rhadamanthys_smoke-loader
-
Size
186KB
-
Sample
250424-qhb2va1zbw
-
MD5
82647830e2a98644a2866139e43d6255
-
SHA1
5f6b74bf618a0f6653b4069253436b951a7d15ad
-
SHA256
fdc33962c8bed9c6bb049b5dbf8a7ed17c414c2725def0fb422c24e2e61790b7
-
SHA512
5351757df6bb1f36d4d7fd1d06e35723b9554e1437f0ec295fa5456248fc73581517d058ea7f45a5be9aa8946ca1b3e9dbee59c20b12c84c646bbf11dbfb19c5
-
SSDEEP
3072:msKf5SDlZNWXpYQVts2Z6fvk9HM2lQBV+UdE+rECWp7hK4:DBAXemtT6X8qBV+UdvrEFp7hK4
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-24_82647830e2a98644a2866139e43d6255_amadey_elex_floxif_redline-stealer_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-24_82647830e2a98644a2866139e43d6255_amadey_elex_floxif_redline-stealer_rhadamanthys_smoke-loader.exe
Resource
win11-20250410-en
Malware Config
Extracted
mylobot
onthestage.ru:6521
stanislasarnoud.ru:5739
krebson.ru:4685
Targets
-
-
Target
2025-04-24_82647830e2a98644a2866139e43d6255_amadey_elex_floxif_redline-stealer_rhadamanthys_smoke-loader
-
Size
186KB
-
MD5
82647830e2a98644a2866139e43d6255
-
SHA1
5f6b74bf618a0f6653b4069253436b951a7d15ad
-
SHA256
fdc33962c8bed9c6bb049b5dbf8a7ed17c414c2725def0fb422c24e2e61790b7
-
SHA512
5351757df6bb1f36d4d7fd1d06e35723b9554e1437f0ec295fa5456248fc73581517d058ea7f45a5be9aa8946ca1b3e9dbee59c20b12c84c646bbf11dbfb19c5
-
SSDEEP
3072:msKf5SDlZNWXpYQVts2Z6fvk9HM2lQBV+UdE+rECWp7hK4:DBAXemtT6X8qBV+UdvrEFp7hK4
-
Floxif family
-
Mylobot family
-
Detects Floxif payload
-
Blocklisted process makes network request
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1