Analysis
-
max time kernel
30s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 11:55
Behavioral task
behavioral1
Sample
Silver RAT.exe
Resource
win10v2004-20241007-en
General
-
Target
Silver RAT.exe
-
Size
479KB
-
MD5
eb580bc45a382527d2f1ff80c542bd9d
-
SHA1
0b95c965fe80c9b9d9270be74817a8771bb02daa
-
SHA256
99bd6ee7da4edad447fba55a6b11538927013586ef617e70a0ff4765adae22db
-
SHA512
a3f4563d4ee61a0bdc612c849f13711af961514cbe3ce48ab9af0b905c8df278f470e902bc50b64d95055f2bd69fd288bba1dd0405caf9e4a42585cdf6b3e23c
-
SSDEEP
6144:pTNlPsSiE0grIlHAjNL7S8AtKZnbr8qz6xzS06d17GQxAAXcpGZ5wIzkyOD+lRXs:pFR0gsAjNL6tQbr8w6xely1JcXgDsLm
Malware Config
Extracted
rhadamanthys
https://95.214.55.177:1689/e21adcd5478c6d21f12/jf923j9f.kd10d2
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Deletes itself 1 IoCs
pid Process 2352 dialer.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silver RAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1116 Silver RAT.exe 1116 Silver RAT.exe 2352 dialer.exe 2352 dialer.exe 2352 dialer.exe 2352 dialer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2352 1116 Silver RAT.exe 82 PID 1116 wrote to memory of 2352 1116 Silver RAT.exe 82 PID 1116 wrote to memory of 2352 1116 Silver RAT.exe 82 PID 1116 wrote to memory of 2352 1116 Silver RAT.exe 82 PID 1116 wrote to memory of 2352 1116 Silver RAT.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Silver RAT.exe"C:\Users\Admin\AppData\Local\Temp\Silver RAT.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352
-