General

  • Target

    66906c8af1236b3097fdd170cea6b4dacc4a9df4a491aa1285c1fba45f41360f

  • Size

    1.8MB

  • Sample

    230308-egzwqsdh43

  • MD5

    0089eede6a0cbf540f4b724a965a12c4

  • SHA1

    c1240858dc3609275e9036c12aa6a300f1907d33

  • SHA256

    66906c8af1236b3097fdd170cea6b4dacc4a9df4a491aa1285c1fba45f41360f

  • SHA512

    124b5fe2f14beec2adea7a638cfac089227fcdcf25485d4d28971808ab80b144e58b9756511a1ccd9b893c3e692f86a58ea9af3e581a54a6f0867d7e1fb0f9d0

  • SSDEEP

    24576:exG5ObB0Av+GO3yd3bkkLYOFTxU+XASp26spzctp0jwJdhxPQEai:eQG3bk+YW5nHmjw/QEa

Malware Config

Targets

    • Target

      66906c8af1236b3097fdd170cea6b4dacc4a9df4a491aa1285c1fba45f41360f

    • Size

      1.8MB

    • MD5

      0089eede6a0cbf540f4b724a965a12c4

    • SHA1

      c1240858dc3609275e9036c12aa6a300f1907d33

    • SHA256

      66906c8af1236b3097fdd170cea6b4dacc4a9df4a491aa1285c1fba45f41360f

    • SHA512

      124b5fe2f14beec2adea7a638cfac089227fcdcf25485d4d28971808ab80b144e58b9756511a1ccd9b893c3e692f86a58ea9af3e581a54a6f0867d7e1fb0f9d0

    • SSDEEP

      24576:exG5ObB0Av+GO3yd3bkkLYOFTxU+XASp26spzctp0jwJdhxPQEai:eQG3bk+YW5nHmjw/QEa

    • Detect rhadamanthys stealer shellcode

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks