General
-
Target
https://dl.dropbox.com/scl/fi/hqtl599agsvsab9ijb6k4/YG.pdf?rlkey=3gohs0awn0aw8e1ugsjirw54e&st=myg4ma8u&dl=0
-
Sample
240909-eywkmstgja
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dl.dropbox.com/scl/fi/hqtl599agsvsab9ijb6k4/YG.pdf?rlkey=3gohs0awn0aw8e1ugsjirw54e&st=myg4ma8u&dl=0
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
https://dl.dropbox.com/scl/fi/hqtl599agsvsab9ijb6k4/YG.pdf?rlkey=3gohs0awn0aw8e1ugsjirw54e&st=myg4ma8u&dl=0
Score10/10-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1