General
-
Target
c4c5c296ff9dd8f2518960f5521747335c5a457e3cb0be2eee0bf8bcf8f64482
-
Size
374KB
-
Sample
230715-arzw9shd71
-
MD5
11715c27335a026129dfc1695ebc8888
-
SHA1
0ffaa4f65fbf2bc0750b972621f37c787b0231e2
-
SHA256
c4c5c296ff9dd8f2518960f5521747335c5a457e3cb0be2eee0bf8bcf8f64482
-
SHA512
f7743e16fa619a90cb2c216bc46e2f3b10973e2d3aeb81be27d284e52758cc6fd204dc0babef2bfd01e8bfdc12e70c35dd0f50472f06635f489d2db8060b1220
-
SSDEEP
6144:QtLsBkjsroZJCTfQtzrmGaLOLn10TCvDuNcwnkOrpbMfBjiOQDvFp:ggAsrowTfQFrLdLWYecxqpmuOQv7
Static task
static1
Behavioral task
behavioral1
Sample
c4c5c296ff9dd8f2518960f5521747335c5a457e3cb0be2eee0bf8bcf8f64482.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
smokeloader
2022
http://serverxlogs21.xyz/statweb255/
http://servxblog79.xyz/statweb255/
http://demblog289.xyz/statweb255/
http://admlogs77x.online/statweb255/
http://blogxstat38.xyz/statweb255/
http://blogxstat25.xyz/statweb255/
Extracted
systembc
adstat477d.xyz:4044
demstat577d.xyz:4044
Targets
-
-
Target
c4c5c296ff9dd8f2518960f5521747335c5a457e3cb0be2eee0bf8bcf8f64482
-
Size
374KB
-
MD5
11715c27335a026129dfc1695ebc8888
-
SHA1
0ffaa4f65fbf2bc0750b972621f37c787b0231e2
-
SHA256
c4c5c296ff9dd8f2518960f5521747335c5a457e3cb0be2eee0bf8bcf8f64482
-
SHA512
f7743e16fa619a90cb2c216bc46e2f3b10973e2d3aeb81be27d284e52758cc6fd204dc0babef2bfd01e8bfdc12e70c35dd0f50472f06635f489d2db8060b1220
-
SSDEEP
6144:QtLsBkjsroZJCTfQtzrmGaLOLn10TCvDuNcwnkOrpbMfBjiOQDvFp:ggAsrowTfQFrLdLWYecxqpmuOQv7
-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Renames multiple (87) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-