General
-
Target
WEXTRACT.EXE.exe
-
Size
3.5MB
-
Sample
240108-cbjlfshfbk
-
MD5
174bb8966713f5795a2ab95eebdc686a
-
SHA1
33d8fdf324501b80295f2ecdfe2caa03332be8f3
-
SHA256
078245ad68ac4acc2f059d9c2df2f4bffa4b2e4f40279eba96d6f7581d58fc2e
-
SHA512
f84218d17c224c2e04a6994d6fb747c7b7230bfd8915fe34c6d5b49350bafaa4d840bf5fd2ba1a972b44afb4d6db6bf0812f497d98dfebfaef011ed7dac8669b
-
SSDEEP
98304:zL7RPWnp4MfLHCpxUmZ+UHbE594ZtyrjmR+:zhwpL4HZ+wW4Z4jS
Static task
static1
Behavioral task
behavioral1
Sample
WEXTRACT.EXE.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
WEXTRACT.EXE.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
WEXTRACT.EXE.exe
-
Size
3.5MB
-
MD5
174bb8966713f5795a2ab95eebdc686a
-
SHA1
33d8fdf324501b80295f2ecdfe2caa03332be8f3
-
SHA256
078245ad68ac4acc2f059d9c2df2f4bffa4b2e4f40279eba96d6f7581d58fc2e
-
SHA512
f84218d17c224c2e04a6994d6fb747c7b7230bfd8915fe34c6d5b49350bafaa4d840bf5fd2ba1a972b44afb4d6db6bf0812f497d98dfebfaef011ed7dac8669b
-
SSDEEP
98304:zL7RPWnp4MfLHCpxUmZ+UHbE594ZtyrjmR+:zhwpL4HZ+wW4Z4jS
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1