General

  • Target

    LWClient.rar

  • Size

    237KB

  • Sample

    240828-p64akayfnb

  • MD5

    f57e80963cef749018ce233f619bcd1c

  • SHA1

    1f0a7f68ebbe417d610dd2a76d1374fa288db32c

  • SHA256

    1e7baed6e127accb731c667808a05a6abcdc2db39e69fef3ad453bc76af0347d

  • SHA512

    c13eb72ce7a5fba32ac1600bb4173027506dea13e0134b3ef5702f32ef73ce2c4671a6e8a654e0582d16173e3a19d6868c99e4f00244dd36742aa06cb2ae3d5b

  • SSDEEP

    6144:qGu1L/dS7hcMiM8oCH3rD9bFufV9EXVvg1IOE2BclY6rHDAS:Xu1zdIcMmpQd9+hy+jAS

Malware Config

Extracted

Family

rhadamanthys

C2

https://185.125.50.38:3034/739bd3e91cd40ca83/lem.api

Extracted

Family

rhadamanthys

C2

https://195.3.223.126:4287/9d0dc091285eb9fbf2e/o8f3c8oj.8rdif

Targets

    • Target

      LWClient.exe

    • Size

      355KB

    • MD5

      bb84cc2853596d21a318576c4995fcce

    • SHA1

      477a224d5b4e398b34a978ac19def1cbafb211d3

    • SHA256

      6135bdbcfd9f824b3da0bef2ba73018a998967e20c5d0274c6a1c0433649b017

    • SHA512

      aa32be3d91bf6e2c8fed0d0e0407723466b477ab0d27c5d3cd705ac73365ab4c56de4f16d4786ee586e750d6835eba09775dbf5a93b0da0eaea4326f2fc2bd5c

    • SSDEEP

      6144:g2qezd2ab1/RuHk+M3k8M3W7XomjOJCqshrOlumY6DMIewgxQfqksb:gf2R/EEkCQFYDwRqv

    • Detect rhadamanthys stealer shellcode

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks