Static task
static1
Behavioral task
behavioral1
Sample
Radium/RadiumExecutor.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Radium/RadiumExecutor.exe
Resource
win10v2004-20231215-en
General
-
Target
RadiumExecutor.zip
-
Size
11.7MB
-
MD5
254dc8cb576930b70d5395b117d6b8d4
-
SHA1
40927e93eac750b29a1953011af20ab6b7860513
-
SHA256
5e4fe16f13855e0c9cb6ffcf21ea0cc627536e2b0153cf6f2f8a8b1d85c0bfa1
-
SHA512
366ec9da8d0059502834765381b2b1a066c07b06a0054a62202e1283227cf5591363f353ff72744df94a21f8a7f11c54b2b53cd9951163da2ce7432a50b1c203
-
SSDEEP
196608:ttF6CFTsoJ0+gANew5rXXodTyoNjIE/AHxi2EgWbpG9PfNzIPbeTB0xoMUad/r:tK6o/+/New5o4oyE/t26bpG5UiF0WMUC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/Radium/RadiumExecutor.exe
Files
-
RadiumExecutor.zip.zip
Password: 2023
-
Radium/RadiumExecutor.exe.exe windows:4 windows x86 arch:x86
Password: 2023
6f462fcc6b830b77fb3fef2add9dc570
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
malloc
_sleep
memset
strcmp
strcpy
getenv
sprintf
fopen
fwrite
fclose
__argc
__argv
_environ
_XcptFilter
__set_app_type
_controlfp
__getmainargs
exit
shell32
ShellExecuteA
kernel32
SetUnhandledExceptionFilter
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12.5MB - Virtual size: 12.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ