General

  • Target

    9ba9a2feb73a5cf966c84486493cd6794723538f57e9100d7e5f3bf83c148ba4

  • Size

    1.7MB

  • Sample

    230119-chx3eshd6w

  • MD5

    3d631a7559e59537a57e9fbef5dc9d8c

  • SHA1

    6f6bbfab293562ac339e2f2134c76e6aa99be5fb

  • SHA256

    9ba9a2feb73a5cf966c84486493cd6794723538f57e9100d7e5f3bf83c148ba4

  • SHA512

    425e65bdac791e92ee0d375da3047fe0dfc73950728b5c68df64991970cbde940896c388947585f6201cc1a5e769773d9290ff443c202e32ee55a603f87ee0e9

  • SSDEEP

    49152:tQGiOdmVLsuiPTEVGdiNoVBe9ihFL3LvBH8:tQGiHQTldiNo09CzLvBc

Malware Config

Targets

    • Target

      9ba9a2feb73a5cf966c84486493cd6794723538f57e9100d7e5f3bf83c148ba4

    • Size

      1.7MB

    • MD5

      3d631a7559e59537a57e9fbef5dc9d8c

    • SHA1

      6f6bbfab293562ac339e2f2134c76e6aa99be5fb

    • SHA256

      9ba9a2feb73a5cf966c84486493cd6794723538f57e9100d7e5f3bf83c148ba4

    • SHA512

      425e65bdac791e92ee0d375da3047fe0dfc73950728b5c68df64991970cbde940896c388947585f6201cc1a5e769773d9290ff443c202e32ee55a603f87ee0e9

    • SSDEEP

      49152:tQGiOdmVLsuiPTEVGdiNoVBe9ihFL3LvBH8:tQGiHQTldiNo09CzLvBc

    • Detect rhadamanthys stealer shellcode

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks