General
-
Target
LWClient.rar
-
Size
237KB
-
Sample
240828-p64akayfnb
-
MD5
f57e80963cef749018ce233f619bcd1c
-
SHA1
1f0a7f68ebbe417d610dd2a76d1374fa288db32c
-
SHA256
1e7baed6e127accb731c667808a05a6abcdc2db39e69fef3ad453bc76af0347d
-
SHA512
c13eb72ce7a5fba32ac1600bb4173027506dea13e0134b3ef5702f32ef73ce2c4671a6e8a654e0582d16173e3a19d6868c99e4f00244dd36742aa06cb2ae3d5b
-
SSDEEP
6144:qGu1L/dS7hcMiM8oCH3rD9bFufV9EXVvg1IOE2BclY6rHDAS:Xu1zdIcMmpQd9+hy+jAS
Behavioral task
behavioral1
Sample
LWClient.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
LWClient.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
rhadamanthys
https://185.125.50.38:3034/739bd3e91cd40ca83/lem.api
Extracted
rhadamanthys
https://195.3.223.126:4287/9d0dc091285eb9fbf2e/o8f3c8oj.8rdif
Targets
-
-
Target
LWClient.exe
-
Size
355KB
-
MD5
bb84cc2853596d21a318576c4995fcce
-
SHA1
477a224d5b4e398b34a978ac19def1cbafb211d3
-
SHA256
6135bdbcfd9f824b3da0bef2ba73018a998967e20c5d0274c6a1c0433649b017
-
SHA512
aa32be3d91bf6e2c8fed0d0e0407723466b477ab0d27c5d3cd705ac73365ab4c56de4f16d4786ee586e750d6835eba09775dbf5a93b0da0eaea4326f2fc2bd5c
-
SSDEEP
6144:g2qezd2ab1/RuHk+M3k8M3W7XomjOJCqshrOlumY6DMIewgxQfqksb:gf2R/EEkCQFYDwRqv
-
Detect rhadamanthys stealer shellcode
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2