General
-
Target
https://pwrxa.moliz.site/rpbta
-
Sample
240324-wras2ahc8w
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pwrxa.moliz.site/rpbta
Resource
win10v2004-20240226-en
windows10-2004-x64
23 signatures
150 seconds
Malware Config
Extracted
Family
amadey
Version
4.19
C2
http://185.196.10.188
http://45.159.189.140
http://89.23.103.42
Attributes
-
install_dir
b4e248fdbd
-
install_file
Dctooux.exe
-
strings_key
01edd7c913096383774168b5aeebc95e
-
url_paths
/hb9IvshS/index.php
/hb9IvshS2/index.php
/hb9IvshS3/index.php
rc4.plain
Targets
-
-
Target
https://pwrxa.moliz.site/rpbta
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Creates new service(s)
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-