General
-
Target
63ebbce25ca47930aa53706ba3d3dd5e7c7934bd825bf4b52d1c634d578024ed
-
Size
347KB
-
Sample
230416-d2qywsac7w
-
MD5
222f5c819569e253df42f35fbf67d5d7
-
SHA1
614650abec9e0b4d56afcf6c660673b3633df8a2
-
SHA256
63ebbce25ca47930aa53706ba3d3dd5e7c7934bd825bf4b52d1c634d578024ed
-
SHA512
2dc3cc2d827e4c9516cb2d45f254fb1e2bcb327e17826986637bebb28dc3f7e20e74363cf44190eb73ff6fd9cdc3b3653000a98660f6b5cf0e18ea79abf8a21e
-
SSDEEP
6144:x8RCjoCA+7EwSlZgNXMXnPRyqPZPcJPVwRpKSHbe4:x8IjlzEwSZgNcX0WZ++pKSHq4
Static task
static1
Behavioral task
behavioral1
Sample
63ebbce25ca47930aa53706ba3d3dd5e7c7934bd825bf4b52d1c634d578024ed.exe
Resource
win10-20230220-en
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
rhadamanthys
http://179.43.142.201/img/favicon.png
Targets
-
-
Target
63ebbce25ca47930aa53706ba3d3dd5e7c7934bd825bf4b52d1c634d578024ed
-
Size
347KB
-
MD5
222f5c819569e253df42f35fbf67d5d7
-
SHA1
614650abec9e0b4d56afcf6c660673b3633df8a2
-
SHA256
63ebbce25ca47930aa53706ba3d3dd5e7c7934bd825bf4b52d1c634d578024ed
-
SHA512
2dc3cc2d827e4c9516cb2d45f254fb1e2bcb327e17826986637bebb28dc3f7e20e74363cf44190eb73ff6fd9cdc3b3653000a98660f6b5cf0e18ea79abf8a21e
-
SSDEEP
6144:x8RCjoCA+7EwSlZgNXMXnPRyqPZPcJPVwRpKSHbe4:x8IjlzEwSZgNcX0WZ++pKSHq4
-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Downloads MZ/PE file
-
Deletes itself
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-