Analysis
-
max time kernel
95s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 11:51
Behavioral task
behavioral1
Sample
SilverRAT.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SilverRAT.exe
Resource
win10v2004-20241007-en
General
-
Target
SilverRAT.exe
-
Size
448KB
-
MD5
e1e28c3acf184aa364c9ed9a30ab7289
-
SHA1
1a173a6f4ec39fe467f1b4b91c9fad794167ac1c
-
SHA256
03c72cfabace07b6787d2d1fd66d6d6d9a2fbcb74a827ca4ab7e59aba40cb306
-
SHA512
e8d38c9a144b7f4531e617de45dc240042a7b9ce7dd5766eb2f763b505d9786acccf54f3a03ff3639c36c957e2d14d34b5b59196170eb1b6b5f17e8a417d6991
-
SSDEEP
6144:nC5hyUR+MhyfUj6qfoMXYfIrvQ/zabJzYbLkBWBXpMcwLbjJgSqtUg83T36XE24r:v+BoMmID/mQmpMcmSSIU16XE2e5L
Malware Config
Extracted
rhadamanthys
https://95.214.55.177:2474/fae624c5418d6/black.api
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
SilverRAT.exedescription pid process target process PID 3532 created 2684 3532 SilverRAT.exe sihost.exe -
Deletes itself 1 IoCs
Processes:
dialer.exepid process 996 dialer.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
SilverRAT.exedialer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SilverRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SilverRAT.exedialer.exepid process 3532 SilverRAT.exe 3532 SilverRAT.exe 996 dialer.exe 996 dialer.exe 996 dialer.exe 996 dialer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
SilverRAT.exedescription pid process target process PID 3532 wrote to memory of 996 3532 SilverRAT.exe dialer.exe PID 3532 wrote to memory of 996 3532 SilverRAT.exe dialer.exe PID 3532 wrote to memory of 996 3532 SilverRAT.exe dialer.exe PID 3532 wrote to memory of 996 3532 SilverRAT.exe dialer.exe PID 3532 wrote to memory of 996 3532 SilverRAT.exe dialer.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2684
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\SilverRAT.exe"C:\Users\Admin\AppData\Local\Temp\SilverRAT.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3532