Behavioral task
behavioral1
Sample
5a28e574ae80574670902622831b3891d546bd6222cffca06144aca6a1f24a19.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5a28e574ae80574670902622831b3891d546bd6222cffca06144aca6a1f24a19.exe
Resource
win10v2004-20240508-en
General
-
Target
5a28e574ae80574670902622831b3891d546bd6222cffca06144aca6a1f24a19
-
Size
179KB
-
MD5
173cc75981bcb16ecbc4788cb9356277
-
SHA1
d6e7eee7b904cd99463e95d207fc3df2ef5e9381
-
SHA256
5a28e574ae80574670902622831b3891d546bd6222cffca06144aca6a1f24a19
-
SHA512
899023481ab5cf4a4f2d16cb5503bbbd3335c2890cf41af610f49140d76ebbebad06d6ac811a3acb4bf4b65e8d11956733a0162effd3383f7580969f5e8ca440
-
SSDEEP
3072:bwevYpKTDMDUXfuuE46lC4PQyfHU6Ig4cjnjFRpbll/XbqefxlS3ETgmBN8vqI57:sevY8mau3wB4HzlrzPOefxoEBKr
Malware Config
Extracted
rhadamanthys
http://179.43.154.216/img/favicon.ico
Signatures
-
Rhadamanthys family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a28e574ae80574670902622831b3891d546bd6222cffca06144aca6a1f24a19
Files
-
5a28e574ae80574670902622831b3891d546bd6222cffca06144aca6a1f24a19.exe windows:5 windows x86 arch:x86
f214c5f744673db93dec4b219265fbc2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CloseHandle
IsBadStringPtrA
IsBadCodePtr
GetModuleHandleA
GetQueuedCompletionStatus
FlushFileBuffers
HeapSize
WriteConsoleW
SetStdHandle
RtlUnwind
IsBadReadPtr
VirtualQuery
GetSystemInfo
CreateIoCompletionPort
HeapDestroy
GetProcessHeap
HeapCreate
ExitProcess
GetTickCount
lstrlenA
HeapReAlloc
HeapFree
HeapAlloc
InterlockedIncrement
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
LCMapStringEx
GetStringTypeW
GetCommandLineA
IsDebuggerPresent
EncodePointer
DecodePointer
IsProcessorFeaturePresent
SetLastError
InterlockedDecrement
GetCurrentThreadId
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
GetModuleHandleExW
GetProcAddress
GetStdHandle
WriteFile
GetModuleFileNameW
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InitOnceExecuteOnce
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
GetCurrentProcess
TerminateProcess
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
GetConsoleCP
GetConsoleMode
SetFilePointerEx
Sleep
CreateFileW
user32
DrawTextW
TranslateMessage
GetMessageW
DispatchMessageW
gdi32
CreateCompatibleDC
SelectPalette
CreatePen
DeleteObject
SetROP2
BitBlt
CreateRectRgn
PathToRegion
CreateCompatibleBitmap
CreateBitmap
DeleteDC
advapi32
GetUserNameW
IsTextUnicode
shell32
CommandLineToArgvW
SHGetFolderPathW
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoInitialize
CoTaskMemFree
CoCreateInstance
shlwapi
PathCompactPathExW
PathMakeSystemFolderW
winmm
PlaySoundW
waveOutGetNumDevs
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ