General

  • Target

    ae9768a3474439037f053a672ffae03608fa3e127aa9927b0127b7a22825c62a.exe

  • Size

    15.1MB

  • Sample

    241018-cyk3ssvblq

  • MD5

    4247605d401ed13d7584377852052793

  • SHA1

    9456200c2cc28957491a3e9709acbe6fb834a687

  • SHA256

    ae9768a3474439037f053a672ffae03608fa3e127aa9927b0127b7a22825c62a

  • SHA512

    8a1aa03b57ed8778fa1ae9d449dfd34fc514dd38bdccad39c0095540ff745fbb784b35061c8d9d214054ad5004dbde31430395fc1d9d1c1ac52c19cfb52bf3a2

  • SSDEEP

    393216:Vn8IgucBc26M/Rovs1B7I5RmPAfAmYKYUC0sdeC:58ju8c26MZo26FrYdhYC

Malware Config

Targets

    • Target

      ae9768a3474439037f053a672ffae03608fa3e127aa9927b0127b7a22825c62a.exe

    • Size

      15.1MB

    • MD5

      4247605d401ed13d7584377852052793

    • SHA1

      9456200c2cc28957491a3e9709acbe6fb834a687

    • SHA256

      ae9768a3474439037f053a672ffae03608fa3e127aa9927b0127b7a22825c62a

    • SHA512

      8a1aa03b57ed8778fa1ae9d449dfd34fc514dd38bdccad39c0095540ff745fbb784b35061c8d9d214054ad5004dbde31430395fc1d9d1c1ac52c19cfb52bf3a2

    • SSDEEP

      393216:Vn8IgucBc26M/Rovs1B7I5RmPAfAmYKYUC0sdeC:58ju8c26MZo26FrYdhYC

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks