General

  • Target

    55343936a3ea39980a8dc2e8722b2717.bin

  • Size

    178KB

  • Sample

    230306-bpbbkaab58

  • MD5

    b91d7cf4c6119159c6e6be082415b3f2

  • SHA1

    9e3f5b0a849e4337bc0ef076c2c966901f0723c9

  • SHA256

    f4d5f7d07422eaf0169d910e9ecba6d2e3ff9316ea31446d36a39e2813515dca

  • SHA512

    b0e545d235ee979b79170fcf37362f8dbab0b45026660ddfdbc6052ec368eb78304272ea6830b2352a4fd09a5d6010ad11bc6c46b634d97aec8e93c3b8c63136

  • SSDEEP

    3072:mV/QZfhFgCrVKu1kzi9L0OJL1yJe3umkIkx5U+p9I82Z2V9Peb1XoGdyAKqrCL7D:MQ1heCJKu1kO9LTd3uwk5tpe8FXPe5Xc

Malware Config

Targets

    • Target

      eb1a9e6f3d48b6f9f1f3b070928734bb06d2eb1e23ffa3169046e287a212845b.exe

    • Size

      234KB

    • MD5

      55343936a3ea39980a8dc2e8722b2717

    • SHA1

      4dbd854892ffadf94a2bfabbe5c98613c05bf11b

    • SHA256

      eb1a9e6f3d48b6f9f1f3b070928734bb06d2eb1e23ffa3169046e287a212845b

    • SHA512

      53c2ad5cc2905e415b6e411919dfa3087205eb56bbfdad9bed02395b4b457e1cd93f0e70fc7218917ae490cecd6a94e6c8face0a5b9cb064ec195cbffff416e1

    • SSDEEP

      6144:pjo6Vi/0Yc0F13whS2/vZEFxxzyIEvAPZSpZx61C0K:h14sYVF+eF/+cPwF6An

    • Detect rhadamanthys stealer shellcode

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks