General

  • Target

    507a8fb56f78014c53466d7edd0dd540cc7c313ae492486eb9af983efc5f9f52

  • Size

    2.1MB

  • Sample

    230307-18t1fsbh41

  • MD5

    0e18c5b06390a4f13c89e5deb15bc588

  • SHA1

    16414552b6f3e79ac6734a438fe37398d8dce208

  • SHA256

    507a8fb56f78014c53466d7edd0dd540cc7c313ae492486eb9af983efc5f9f52

  • SHA512

    10d1b03cd30533e463b232b6c53f6874fedaf112aa950b2216857ad9f4535d6d50f92109e1b9a7cbcac538dccbd6454189f451d1a563e2ab84015903ea4e2795

  • SSDEEP

    24576:KiqrQJsIr/LoODDiYCv3CjuOpyVXIg4l8FO4+DpGba2NzJef5z/1rjSTl:Kiqx4o2bCywVm8E6ehrOTl

Malware Config

Targets

    • Target

      507a8fb56f78014c53466d7edd0dd540cc7c313ae492486eb9af983efc5f9f52

    • Size

      2.1MB

    • MD5

      0e18c5b06390a4f13c89e5deb15bc588

    • SHA1

      16414552b6f3e79ac6734a438fe37398d8dce208

    • SHA256

      507a8fb56f78014c53466d7edd0dd540cc7c313ae492486eb9af983efc5f9f52

    • SHA512

      10d1b03cd30533e463b232b6c53f6874fedaf112aa950b2216857ad9f4535d6d50f92109e1b9a7cbcac538dccbd6454189f451d1a563e2ab84015903ea4e2795

    • SSDEEP

      24576:KiqrQJsIr/LoODDiYCv3CjuOpyVXIg4l8FO4+DpGba2NzJef5z/1rjSTl:Kiqx4o2bCywVm8E6ehrOTl

    • Detect rhadamanthys stealer shellcode

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks