General

  • Target

    launcher.exe

  • Size

    35.9MB

  • Sample

    241005-q5ljssyfqc

  • MD5

    6f144d970006586fda9cea641fb399a8

  • SHA1

    95fba60a66ca038f1dcb36ab2cd20261d5ea26bc

  • SHA256

    4ff60e1c1c7286005832d86970414bc4236f31bfcbe261f44ed7e0b7ce78fddd

  • SHA512

    61da15b19e4d92026bf70dd3530c283c7c4d118960bb14f01c063e95f361b2921ca9065bf8902e33616f90005086b28a3c1b48abdbc839a6e3b54a8942b1e1b4

  • SSDEEP

    393216:n1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfS:nMguj8Q4VfvXqFTrYF

Malware Config

Targets

    • Target

      launcher.exe

    • Size

      35.9MB

    • MD5

      6f144d970006586fda9cea641fb399a8

    • SHA1

      95fba60a66ca038f1dcb36ab2cd20261d5ea26bc

    • SHA256

      4ff60e1c1c7286005832d86970414bc4236f31bfcbe261f44ed7e0b7ce78fddd

    • SHA512

      61da15b19e4d92026bf70dd3530c283c7c4d118960bb14f01c063e95f361b2921ca9065bf8902e33616f90005086b28a3c1b48abdbc839a6e3b54a8942b1e1b4

    • SSDEEP

      393216:n1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfS:nMguj8Q4VfvXqFTrYF

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks