General

  • Target

    1054966a50aba444beae4b81c8531c78bffb2bce45fd47ba4c37fe092d4ca6ae

  • Size

    6.2MB

  • Sample

    240830-m93gbssdmn

  • MD5

    c20df1e11a2f0844d1e849779fc34742

  • SHA1

    70e896c048d1a5478aa13296ef6fc786dfaee88c

  • SHA256

    1054966a50aba444beae4b81c8531c78bffb2bce45fd47ba4c37fe092d4ca6ae

  • SHA512

    6f4bc9fff666ca26b7227c969b4cf94c0b091e2ddb9ea608ae9010b55634f646a9a5ea7ac75ec2ec3d66552591add4c67bcd7db2f92f5f92a477eafefa674ac5

  • SSDEEP

    196608:+p9ZAORSyAvEOL/+8Tekq6rQwnDeiGXeU7e0:+p95ScOq8TPqEo

Malware Config

Extracted

Family

rhadamanthys

C2

https://154.216.19.149:2047/888260cc6af8f/x32j9k7e.8c8s5

Targets

    • Target

      1054966a50aba444beae4b81c8531c78bffb2bce45fd47ba4c37fe092d4ca6ae

    • Size

      6.2MB

    • MD5

      c20df1e11a2f0844d1e849779fc34742

    • SHA1

      70e896c048d1a5478aa13296ef6fc786dfaee88c

    • SHA256

      1054966a50aba444beae4b81c8531c78bffb2bce45fd47ba4c37fe092d4ca6ae

    • SHA512

      6f4bc9fff666ca26b7227c969b4cf94c0b091e2ddb9ea608ae9010b55634f646a9a5ea7ac75ec2ec3d66552591add4c67bcd7db2f92f5f92a477eafefa674ac5

    • SSDEEP

      196608:+p9ZAORSyAvEOL/+8Tekq6rQwnDeiGXeU7e0:+p95ScOq8TPqEo

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks