General
-
Target
ChaosSetup.exe
-
Size
71.8MB
-
Sample
240805-fqfpwsxenp
-
MD5
0adda0bd6d5d8cb1ac717dfd0d521c20
-
SHA1
2ced9e2330b482a33bc3c80198286eb27b7dd301
-
SHA256
d420dc452be937c7c558738cc9e06c7e04241dfaaaed875adfdc7e41daa89969
-
SHA512
35d40ae3787484df3ab887d9dcd121d7d0f74f7393df28204b855ece195b8e74d86c6d8d97b1befa9d71ba52d1268ed36ab04927211a7d9b7b0de099eb21b863
-
SSDEEP
1572864:dPPkJopntj5NdTHY4UfBbAnQjgSBLPm1wr/o6Lplupca3yf5dqL:dP3pntj5NotsQMOeqr/o6Lp4caQCL
Static task
static1
Behavioral task
behavioral1
Sample
ChaosSetup.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealc
meowsterioland4
http://45.152.112.131
-
url_path
/8ee66a3c8f19e4b5.php
Targets
-
-
Target
ChaosSetup.exe
-
Size
71.8MB
-
MD5
0adda0bd6d5d8cb1ac717dfd0d521c20
-
SHA1
2ced9e2330b482a33bc3c80198286eb27b7dd301
-
SHA256
d420dc452be937c7c558738cc9e06c7e04241dfaaaed875adfdc7e41daa89969
-
SHA512
35d40ae3787484df3ab887d9dcd121d7d0f74f7393df28204b855ece195b8e74d86c6d8d97b1befa9d71ba52d1268ed36ab04927211a7d9b7b0de099eb21b863
-
SSDEEP
1572864:dPPkJopntj5NdTHY4UfBbAnQjgSBLPm1wr/o6Lplupca3yf5dqL:dP3pntj5NotsQMOeqr/o6Lp4caQCL
-
Detects HijackLoader (aka IDAT Loader)
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2