General
-
Target
816914f2d8ba0f6bac41a9e9e275b88930edeea9b7981b7c1748d6441f202402
-
Size
164KB
-
Sample
230715-jfkgwahb98
-
MD5
9817df86680063737f60dc0031f479a6
-
SHA1
fd7142007513d566f5c198741857e9563396e65b
-
SHA256
816914f2d8ba0f6bac41a9e9e275b88930edeea9b7981b7c1748d6441f202402
-
SHA512
0ebf0369114702f666aedbc69cb243c43df72e50b75f3990268e0d55b2b548f4ade014fb73b940a88eae430e4de82e490f3c7412dadb8c4965d371335ac7f4b8
-
SSDEEP
1536:O0RWWxh0n1DOLNFA8lTMn1dixihQm6+HHDAnQHcql9ZrK4HSAq+b+et7Q04u0DM5:OALdTM1i+YQvl9tK0SPe2LvDM5AX
Static task
static1
Behavioral task
behavioral1
Sample
816914f2d8ba0f6bac41a9e9e275b88930edeea9b7981b7c1748d6441f202402.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
smokeloader
summ
Extracted
smokeloader
2022
http://stalagmijesarl.com/
http://ukdantist-sarl.com/
http://cpcorprotationltd.com/
Extracted
lumma
gstatic-node.io
Targets
-
-
Target
816914f2d8ba0f6bac41a9e9e275b88930edeea9b7981b7c1748d6441f202402
-
Size
164KB
-
MD5
9817df86680063737f60dc0031f479a6
-
SHA1
fd7142007513d566f5c198741857e9563396e65b
-
SHA256
816914f2d8ba0f6bac41a9e9e275b88930edeea9b7981b7c1748d6441f202402
-
SHA512
0ebf0369114702f666aedbc69cb243c43df72e50b75f3990268e0d55b2b548f4ade014fb73b940a88eae430e4de82e490f3c7412dadb8c4965d371335ac7f4b8
-
SSDEEP
1536:O0RWWxh0n1DOLNFA8lTMn1dixihQm6+HHDAnQHcql9ZrK4HSAq+b+et7Q04u0DM5:OALdTM1i+YQvl9tK0SPe2LvDM5AX
-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-