General

  • Target

    f33e43ec6f4426ec239385ceced1a66f8de71114b63ef993750004469fae8108

  • Size

    324KB

  • Sample

    230302-pjhqcace21

  • MD5

    eab34773c208f92d39686d3015968a9e

  • SHA1

    e7b53dcea746c63065d068a731bf9ac3b2a68698

  • SHA256

    f33e43ec6f4426ec239385ceced1a66f8de71114b63ef993750004469fae8108

  • SHA512

    83b15c0cfd594ba1ae8e89db1c96a25e2caa29d8bd3b8271778bbb92895e49d510af43c7b089a7b63238c17f1b6023e305ed74169a9ab5c98f0898b2afdee59d

  • SSDEEP

    6144:M7uLolWx1jVoBQ4tlr0CMN8EIaELUzOP:3Ya1mfeNTVEd

Malware Config

Targets

    • Target

      f33e43ec6f4426ec239385ceced1a66f8de71114b63ef993750004469fae8108

    • Size

      324KB

    • MD5

      eab34773c208f92d39686d3015968a9e

    • SHA1

      e7b53dcea746c63065d068a731bf9ac3b2a68698

    • SHA256

      f33e43ec6f4426ec239385ceced1a66f8de71114b63ef993750004469fae8108

    • SHA512

      83b15c0cfd594ba1ae8e89db1c96a25e2caa29d8bd3b8271778bbb92895e49d510af43c7b089a7b63238c17f1b6023e305ed74169a9ab5c98f0898b2afdee59d

    • SSDEEP

      6144:M7uLolWx1jVoBQ4tlr0CMN8EIaELUzOP:3Ya1mfeNTVEd

    • Detect rhadamanthys stealer shellcode

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks