Behavioral task
behavioral1
Sample
2712-20-0x00000000001B0000-0x000000000022E000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2712-20-0x00000000001B0000-0x000000000022E000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2712-20-0x00000000001B0000-0x000000000022E000-memory.dmp
-
Size
504KB
-
MD5
d805d3de7d4c24931d858fed71741a88
-
SHA1
6c45623f837654ae3d68be4121b5e97328dbc0d8
-
SHA256
4ca8ceb0c5ffd66ea995720be04e3490e124cecc2a8762e2ba9e6e0ba930edc3
-
SHA512
4687f7fae06535c3c7155d68a34922091b85b3772627befd929ce8c6bc371084bc93462e78f28c1bdcb02d946d523812da31362b417bdc1470f57a8b1a23bf04
-
SSDEEP
12288:zWBqf/qq3R5W8ZB4zmRzbaKK0zlng+F9:z9f93PW8ZBS+zbj5P
Malware Config
Extracted
rhadamanthys
https://198.251.84.78:6495/355f5a5585bfaf/casqu0xi.k9xtg
Signatures
-
Rhadamanthys family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2712-20-0x00000000001B0000-0x000000000022E000-memory.dmp
Files
-
2712-20-0x00000000001B0000-0x000000000022E000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 385KB - Virtual size: 385KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ