General

  • Target

    file.exe

  • Size

    1.8MB

  • Sample

    230121-m4jr2abh28

  • MD5

    d62c0adb7bb8113e33b6d1edc9a1a511

  • SHA1

    c527022d7a129c12c5b71116da750f41cf9d868f

  • SHA256

    140b117ebb69f027d931787d2a3b0bb445a655e5460c1100b808297c482ae1f5

  • SHA512

    bf9687f7a2694939818d3a4e58171d6b80204e85f4e1f32bcdb060eb66ece38370e08107253e4687df57f132fdb1f24ef3ac3cdc31dad553b203821ff4d38ddb

  • SSDEEP

    49152:VKX23JkRwZq810P9GNu8Tj05WQOmtgEdnXROt0OQ:VKm3KRwZq810PgN1QwmtgEdnXROK9

Malware Config

Targets

    • Target

      file.exe

    • Size

      1.8MB

    • MD5

      d62c0adb7bb8113e33b6d1edc9a1a511

    • SHA1

      c527022d7a129c12c5b71116da750f41cf9d868f

    • SHA256

      140b117ebb69f027d931787d2a3b0bb445a655e5460c1100b808297c482ae1f5

    • SHA512

      bf9687f7a2694939818d3a4e58171d6b80204e85f4e1f32bcdb060eb66ece38370e08107253e4687df57f132fdb1f24ef3ac3cdc31dad553b203821ff4d38ddb

    • SSDEEP

      49152:VKX23JkRwZq810P9GNu8Tj05WQOmtgEdnXROt0OQ:VKm3KRwZq810PgN1QwmtgEdnXROK9

    • Detect rhadamanthys stealer shellcode

    • Detects LgoogLoader payload

    • LgoogLoader

      A downloader capable of dropping and executing other malware families.

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks