General
-
Target
f4b1f75feb5864acae90b00168dda506c169334a98bb7a147e33e18725a660a4.msi
-
Size
32.8MB
-
Sample
240823-ddgqbatgmn
-
MD5
86a6e8316dda14183644539895fbe10d
-
SHA1
061e8bb0bf7b9a6b3efc919d48187cbf6e6d39ed
-
SHA256
f4b1f75feb5864acae90b00168dda506c169334a98bb7a147e33e18725a660a4
-
SHA512
74fe5fa99cd652ca75b7afc077a54216df7b594d3c3e20e323b76cc7d361df121af2f69915cf680e1e19c117545bf038d6a7855961574707fbf30395a066bb8c
-
SSDEEP
786432:inLwZc62Yf1cfloFG/AavUcpjuwi0biBG:iLwaroFWAavUcRN
Static task
static1
Behavioral task
behavioral1
Sample
f4b1f75feb5864acae90b00168dda506c169334a98bb7a147e33e18725a660a4.msi
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f4b1f75feb5864acae90b00168dda506c169334a98bb7a147e33e18725a660a4.msi
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
f4b1f75feb5864acae90b00168dda506c169334a98bb7a147e33e18725a660a4.msi
-
Size
32.8MB
-
MD5
86a6e8316dda14183644539895fbe10d
-
SHA1
061e8bb0bf7b9a6b3efc919d48187cbf6e6d39ed
-
SHA256
f4b1f75feb5864acae90b00168dda506c169334a98bb7a147e33e18725a660a4
-
SHA512
74fe5fa99cd652ca75b7afc077a54216df7b594d3c3e20e323b76cc7d361df121af2f69915cf680e1e19c117545bf038d6a7855961574707fbf30395a066bb8c
-
SSDEEP
786432:inLwZc62Yf1cfloFG/AavUcpjuwi0biBG:iLwaroFWAavUcRN
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1