General

  • Target

    link.txt

  • Size

    20B

  • Sample

    240923-v11kdayanb

  • MD5

    76c9d029aef0ec75fcb3ac8a247d5a3d

  • SHA1

    302c59ceceefa9ce234aa5fb932411da8f7c4098

  • SHA256

    f0fdacf36c7b831b9fc142a87b30f78102890791de309ac1046a12f30473a728

  • SHA512

    b8c5bff79717729da1ce04decd2138ba7a26c80332005608013e80d1e14b7869686e97a8c160aad8a4da1c8954084ece30a71237347061de94a8732c7dbf7e05

Malware Config

Targets

    • Target

      link.txt

    • Size

      20B

    • MD5

      76c9d029aef0ec75fcb3ac8a247d5a3d

    • SHA1

      302c59ceceefa9ce234aa5fb932411da8f7c4098

    • SHA256

      f0fdacf36c7b831b9fc142a87b30f78102890791de309ac1046a12f30473a728

    • SHA512

      b8c5bff79717729da1ce04decd2138ba7a26c80332005608013e80d1e14b7869686e97a8c160aad8a4da1c8954084ece30a71237347061de94a8732c7dbf7e05

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks