General
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbnI3aEhTeElhbm5nS3JSanFZTlozUlc5dmkzQXxBQ3Jtc0tsNXJBSWdKbGRTVUFxQTZITHRTZVBkb3NFdkhsUEZmd2NfV3dia3hxUVVpczBSSXBzTkpMQkVaa0JfcnBoM0FPYTA0bVRWTm1CWF9aWVBSNi00SFUtU1RwdlpyNjVRV1UwUXZFOHcxT0d2STk1RS1aOA&q=https%3A%2F%2Frekonise.com%2Fexec-ss8lr&v=OQtKIe-vJqw
-
Sample
241004-2xk4va1crp
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbnI3aEhTeElhbm5nS3JSanFZTlozUlc5dmkzQXxBQ3Jtc0tsNXJBSWdKbGRTVUFxQTZITHRTZVBkb3NFdkhsUEZmd2NfV3dia3hxUVVpczBSSXBzTkpMQkVaa0JfcnBoM0FPYTA0bVRWTm1CWF9aWVBSNi00SFUtU1RwdlpyNjVRV1UwUXZFOHcxT0d2STk1RS1aOA&q=https%3A%2F%2Frekonise.com%2Fexec-ss8lr&v=OQtKIe-vJqw
Resource
win11-20240802-en
Malware Config
Extracted
rhadamanthys
https://135.181.4.162:2423/97e9fc994198e76/02dgpgfn.5rkt4
Targets
-
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbnI3aEhTeElhbm5nS3JSanFZTlozUlc5dmkzQXxBQ3Jtc0tsNXJBSWdKbGRTVUFxQTZITHRTZVBkb3NFdkhsUEZmd2NfV3dia3hxUVVpczBSSXBzTkpMQkVaa0JfcnBoM0FPYTA0bVRWTm1CWF9aWVBSNi00SFUtU1RwdlpyNjVRV1UwUXZFOHcxT0d2STk1RS1aOA&q=https%3A%2F%2Frekonise.com%2Fexec-ss8lr&v=OQtKIe-vJqw
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-