Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 11:51
Behavioral task
behavioral1
Sample
SilverRAT.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SilverRAT.exe
Resource
win10v2004-20241007-en
General
-
Target
SilverRAT.exe
-
Size
448KB
-
MD5
e1e28c3acf184aa364c9ed9a30ab7289
-
SHA1
1a173a6f4ec39fe467f1b4b91c9fad794167ac1c
-
SHA256
03c72cfabace07b6787d2d1fd66d6d6d9a2fbcb74a827ca4ab7e59aba40cb306
-
SHA512
e8d38c9a144b7f4531e617de45dc240042a7b9ce7dd5766eb2f763b505d9786acccf54f3a03ff3639c36c957e2d14d34b5b59196170eb1b6b5f17e8a417d6991
-
SSDEEP
6144:nC5hyUR+MhyfUj6qfoMXYfIrvQ/zabJzYbLkBWBXpMcwLbjJgSqtUg83T36XE24r:v+BoMmID/mQmpMcmSSIU16XE2e5L
Malware Config
Extracted
rhadamanthys
https://95.214.55.177:2474/fae624c5418d6/black.api
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
SilverRAT.exedescription pid process target process PID 2252 created 1200 2252 SilverRAT.exe Explorer.EXE -
Deletes itself 1 IoCs
Processes:
dialer.exepid process 280 dialer.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
SilverRAT.exedialer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SilverRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SilverRAT.exedialer.exepid process 2252 SilverRAT.exe 2252 SilverRAT.exe 280 dialer.exe 280 dialer.exe 280 dialer.exe 280 dialer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SilverRAT.exedescription pid process target process PID 2252 wrote to memory of 280 2252 SilverRAT.exe dialer.exe PID 2252 wrote to memory of 280 2252 SilverRAT.exe dialer.exe PID 2252 wrote to memory of 280 2252 SilverRAT.exe dialer.exe PID 2252 wrote to memory of 280 2252 SilverRAT.exe dialer.exe PID 2252 wrote to memory of 280 2252 SilverRAT.exe dialer.exe PID 2252 wrote to memory of 280 2252 SilverRAT.exe dialer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\SilverRAT.exe"C:\Users\Admin\AppData\Local\Temp\SilverRAT.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2252
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:280
-