Behavioral task
behavioral1
Sample
5b2c5bd17a50bf0ffcc6b80277274ec4b6373aef889e22b896738df9b08d687f(1).exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b2c5bd17a50bf0ffcc6b80277274ec4b6373aef889e22b896738df9b08d687f(1).exe
Resource
win10v2004-20240802-en
General
-
Target
5b2c5bd17a50bf0ffcc6b80277274ec4b6373aef889e22b896738df9b08d687f(1)
-
Size
438KB
-
MD5
f400057763476649ca620a1fa7792c22
-
SHA1
f8e4f976cc28fcd8e91cf1dc48cb503642cd7ded
-
SHA256
5b2c5bd17a50bf0ffcc6b80277274ec4b6373aef889e22b896738df9b08d687f
-
SHA512
3efc264b36c50d30a98fae7adb7acd1ef4b79314e1d708a67d8535bb3d5ffcd0838765b92fd9789e2436d0d75ea69672eee2f5fa55b7d6c9577491b775ab9e3d
-
SSDEEP
12288:6uZZani4FaYkizhRpfX54K+uiE8BZzhzJ:6+ZIi4Z95/54K+uiE87d
Malware Config
Extracted
rhadamanthys
https://94.156.8.232/656e6d0ebe84e51bf0e6/ggs8bwxh.gt2k3
Signatures
-
Rhadamanthys family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5b2c5bd17a50bf0ffcc6b80277274ec4b6373aef889e22b896738df9b08d687f(1)
Files
-
5b2c5bd17a50bf0ffcc6b80277274ec4b6373aef889e22b896738df9b08d687f(1).exe windows:6 windows x64 arch:x64
d7fa2572888c8bf82e5ce063fb4df4c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LCMapStringW
GetStringTypeW
GetFileType
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
FindClose
GetModuleHandleExW
TerminateProcess
ExitProcess
GetCurrentProcess
WriteFile
GetStdHandle
RaiseException
LoadLibraryExW
GetProcAddress
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CreateFileW
WriteConsoleW
lstrlenW
GetModuleHandleA
GetModuleFileNameW
CreateEventA
WaitForSingleObject
GetProcessHeap
HeapFree
HeapAlloc
HeapDestroy
HeapCreate
FindNextFileW
CloseHandle
LeaveCriticalSection
EnterCriticalSection
SetLastError
GetLastError
RtlUnwindEx
GetModuleHandleW
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
user32
GetClassInfoW
DeleteMenu
DefMDIChildProcW
CharUpperBuffW
SetMenuItemInfoW
GetDlgCtrlID
DispatchMessageW
GetDCEx
GetClassInfoExW
ShowWindow
DestroyWindow
IsDialogMessageW
LoadCursorW
CreateAcceleratorTableW
PeekMessageW
CreateWindowExW
RegisterClassW
IsIconic
GetSystemMenu
EnableWindow
FrameRect
LoadStringW
IsZoomed
LoadBitmapW
GetMenuItemInfoW
MsgWaitForMultipleObjectsEx
GetCursor
ShowCaret
PostMessageW
CreateIcon
GetClientRect
GetWindowTextW
CreateMenu
DrawMenuBar
CopyImage
FillRect
DefFrameProcW
EndPaint
GetScrollPos
SetScrollPos
GetMenuStringW
DestroyIcon
DrawFocusRect
BeginPaint
ReleaseDC
KillTimer
EndMenu
InsertMenuW
DestroyCursor
SetTimer
GetScrollInfo
DestroyMenu
GetScrollRange
LoadIconW
DrawIcon
gdi32
GetEnhMetaFileHeader
CreateCompatibleBitmap
Polygon
SetAbortProc
RectVisible
SetBkMode
CreateICW
CreateSolidBrush
PolyBezierTo
RoundRect
SetTextColor
CreateDCW
GetWindowOrgEx
RestoreDC
StretchBlt
CreatePalette
MoveToEx
SetRectRgn
AngleArc
GetTextMetricsW
Pie
GetStockObject
ole32
CoTaskMemFree
IsEqualGUID
CoUninitialize
CoInitialize
OleInitialize
CoTaskMemAlloc
OleUninitialize
CoCreateInstance
oleaut32
SysFreeString
SafeArrayGetElement
SafeArrayCreate
SafeArrayPtrOfIndex
GetErrorInfo
SafeArrayGetUBound
SysAllocStringLen
VariantCopyInd
SysReAllocStringLen
SafeArrayPutElement
VariantInit
SafeArrayGetLBound
VariantClear
VariantChangeType
SafeArrayAccessData
SafeArrayUnaccessData
VariantCopy
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
Sections
.text Size: 384KB - Virtual size: 383KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ