General
-
Target
setupV4.5.zip
-
Size
17.8MB
-
Sample
240805-yhe3hawfmp
-
MD5
9e295b0faf3d94316585238d82b07a27
-
SHA1
2198ba31b4a24e21eeb8655698177843ab54f0bd
-
SHA256
a2339e7fffaf4adeb6e4c023467dc361c32b6e94347f4f03dad907ccd1ca5dd4
-
SHA512
47d399fe5be808b7cacd6b825891dc5c8831c77d82a5028b693830fb329984beee02ba515981e0b9e202e6cbd30240af80e713bd7cb0ea4f37679f114429f555
-
SSDEEP
393216:3huVy83D+nT+Z/XN5lb4ImK8nk9wBnNhVgg6dTR5+o7Sql7UJEuK:EVDmgX7RXl8ket/6bt7UJEuK
Static task
static1
Behavioral task
behavioral1
Sample
SetupV4.5.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
SetupV4.5.exe
-
Size
59.8MB
-
MD5
122e5491ff7d692f2308b0f40e49e32a
-
SHA1
03c00f1e743584409024e64ed2f216bce5dc2153
-
SHA256
569668593ebaffc50c1bf819b3908416ab98959cfe3a5438d199360c172bd674
-
SHA512
5d3b627e6b9d2531ce557e6bcd14326219227fc3e6d05c3e085a63f8bb3e6fff3f4a7abfc424b3885811dee600992a3dc0e213ddd4650b9275a3d1709e5f9e2c
-
SSDEEP
196608:Yj1rr+exTfU3+e2J7crs+efUlT4E6RAEbIBOHtMxoXLaz5LbpGdYWtftJJoBOC2b:err+ceXiml9DoGqXLaz5XpGSWzoBw
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Discovery
Network Share Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
7System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1