General
-
Target
1c98e7c89524a15ae3daff5b91c58b37b2f7d8e62b43b99b1985fadea9460efb
-
Size
351KB
-
Sample
230415-mjtfqsfc81
-
MD5
4c49f12628949ac2d2af0f0f73db0fb0
-
SHA1
f0311d3848272ad7508e4c58383a334c20f48f2a
-
SHA256
1c98e7c89524a15ae3daff5b91c58b37b2f7d8e62b43b99b1985fadea9460efb
-
SHA512
677ad6f0cf59c1d64957ddd981b646d1fb41b14c87ecffdecfa7cd99ff43e7d5e219b8c3b0c1c75b2fe714517247101c9e81b223fa273b518722f8c42b834f2e
-
SSDEEP
3072:RXBe3TjC//GEf/sHbDsoE1Tpr6bcV+AZlfihxjYOXMVl7ZFIvPGs3NJgyteDr6J4:1BJOa/s7A9r91Eb1XMvEvO+vE6ugwe4
Static task
static1
Behavioral task
behavioral1
Sample
1c98e7c89524a15ae3daff5b91c58b37b2f7d8e62b43b99b1985fadea9460efb.exe
Resource
win10-20230220-en
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Targets
-
-
Target
1c98e7c89524a15ae3daff5b91c58b37b2f7d8e62b43b99b1985fadea9460efb
-
Size
351KB
-
MD5
4c49f12628949ac2d2af0f0f73db0fb0
-
SHA1
f0311d3848272ad7508e4c58383a334c20f48f2a
-
SHA256
1c98e7c89524a15ae3daff5b91c58b37b2f7d8e62b43b99b1985fadea9460efb
-
SHA512
677ad6f0cf59c1d64957ddd981b646d1fb41b14c87ecffdecfa7cd99ff43e7d5e219b8c3b0c1c75b2fe714517247101c9e81b223fa273b518722f8c42b834f2e
-
SSDEEP
3072:RXBe3TjC//GEf/sHbDsoE1Tpr6bcV+AZlfihxjYOXMVl7ZFIvPGs3NJgyteDr6J4:1BJOa/s7A9r91Eb1XMvEvO+vE6ugwe4
-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Downloads MZ/PE file
-
Deletes itself
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-