General
-
Target
link.txt
-
Size
20B
-
Sample
240923-v11kdayanb
-
MD5
76c9d029aef0ec75fcb3ac8a247d5a3d
-
SHA1
302c59ceceefa9ce234aa5fb932411da8f7c4098
-
SHA256
f0fdacf36c7b831b9fc142a87b30f78102890791de309ac1046a12f30473a728
-
SHA512
b8c5bff79717729da1ce04decd2138ba7a26c80332005608013e80d1e14b7869686e97a8c160aad8a4da1c8954084ece30a71237347061de94a8732c7dbf7e05
Static task
static1
Malware Config
Targets
-
-
Target
link.txt
-
Size
20B
-
MD5
76c9d029aef0ec75fcb3ac8a247d5a3d
-
SHA1
302c59ceceefa9ce234aa5fb932411da8f7c4098
-
SHA256
f0fdacf36c7b831b9fc142a87b30f78102890791de309ac1046a12f30473a728
-
SHA512
b8c5bff79717729da1ce04decd2138ba7a26c80332005608013e80d1e14b7869686e97a8c160aad8a4da1c8954084ece30a71237347061de94a8732c7dbf7e05
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-