General
-
Target
launcher_pass_1234.zip
-
Size
105.0MB
-
Sample
241009-d81rns1hlp
-
MD5
add38a069ae17cdf99141bddc0a0621d
-
SHA1
9f7455269638c489e97fc094e4b162d05739adc4
-
SHA256
5ff55b93a1e7df7e5f0cc6403292f078cd7b5d0e369162083d24cffa9b0ab5b7
-
SHA512
02054aadd0bb5b7b01d18bd39140608c7420a223886b831d64f78d7b988a7611f8a37a154ca869038b8106c39b3537a4f8886dc3786efee9f4bdc7ea1b5b05a3
-
SSDEEP
3145728:C6ZyPeW26Ff9B8s4IjWcLV+dpKTt8ZfgD1ru:KP5FX8bpCOpuYfgD1ru
Static task
static1
Malware Config
Targets
-
-
Target
launcher_pass_1234.zip
-
Size
105.0MB
-
MD5
add38a069ae17cdf99141bddc0a0621d
-
SHA1
9f7455269638c489e97fc094e4b162d05739adc4
-
SHA256
5ff55b93a1e7df7e5f0cc6403292f078cd7b5d0e369162083d24cffa9b0ab5b7
-
SHA512
02054aadd0bb5b7b01d18bd39140608c7420a223886b831d64f78d7b988a7611f8a37a154ca869038b8106c39b3537a4f8886dc3786efee9f4bdc7ea1b5b05a3
-
SSDEEP
3145728:C6ZyPeW26Ff9B8s4IjWcLV+dpKTt8ZfgD1ru:KP5FX8bpCOpuYfgD1ru
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-