Behavioral task
behavioral1
Sample
black.exe
Resource
win10v2004-20241007-en
General
-
Target
black.exe
-
Size
444KB
-
MD5
c3ec8ce62adc05301e89a5db1694d79d
-
SHA1
033a64fd7f407d319dd660e9f9ba49851b9229a1
-
SHA256
97cc46d4f3ed56b872bd8cd8a7f35a6a3128b898bb8a5b03c36c4f8d29f0f9cf
-
SHA512
cebaa16485bfd01081b727375a458f9a817a5295a157adffbf5ec4f76697caa8bc6d8f0de5909dab98f6948d085f82ebbab479bfb3d3c2a285b3f422139baf6d
-
SSDEEP
6144:IjKvnAzRPqkroWvcrTIhB1uA2dOJhhgWbMbitWGFNuldsfiy3NiGA:Ijzgk08oIuA6ahE+F0/y36
Malware Config
Extracted
rhadamanthys
https://195.3.223.214:5130/c008e75f3f6ebf29101c5c81/fond.api
Signatures
-
Rhadamanthys family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource black.exe
Files
-
black.exe.exe windows:4 windows x86 arch:x86
c304949191802a43e7e86d8fe3dcaf65
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
HeapCreate
VirtualQuery
OutputDebugStringA
WaitForSingleObject
HeapDestroy
CreateEventW
ExitProcess
WideCharToMultiByte
OutputDebugStringW
CreateFileW
ReadFile
CloseHandle
GetCurrentProcess
MultiByteToWideChar
GetModuleHandleW
InterlockedIncrement
GetModuleFileNameW
lstrlenW
HeapFree
MulDiv
GetProcessHeap
HeapAlloc
VirtualProtect
HeapSize
GetSystemTimeAsFileTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
TlsAlloc
SetLastError
GetCurrentThreadId
GetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
TerminateProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
user32
ReleaseDC
GetDC
GetSystemMetrics
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
gdi32
CreatePen
CloseMetaFile
CreatePolygonRgn
Pie
Chord
RealizePalette
GetCharacterPlacementW
GetObjectW
DPtoLP
StartDocW
RectVisible
GetStockObject
SaveDC
GetTextMetricsA
EndPath
GetNearestColor
CreatePenIndirect
CreateHalftonePalette
GetDIBColorTable
PolyBezier
SetWinMetaFileBits
FillRgn
RectInRegion
CreateFontIndirectW
ExtFloodFill
PtInRegion
GetBitmapBits
GetDeviceCaps
CopyEnhMetaFileW
GetEnhMetaFileHeader
SetRectRgn
StartPage
CreatePatternBrush
EndPage
EqualRgn
TextOutW
Rectangle
SetStretchBltMode
GetWorldTransform
GetDIBits
BeginPath
SetAbortProc
StretchBlt
GetROP2
SetWorldTransform
CreateDIBitmap
CreatePalette
GetViewportOrgEx
GetClipBox
ExtCreateRegion
SetMetaFileBitsEx
SetBkMode
CombineTransform
DeleteObject
SelectObject
Polyline
CreateFontIndirectA
SelectPalette
SetTextJustification
CreateBrushIndirect
SetTextColor
GetBkMode
MoveToEx
AbortDoc
GetSystemPaletteEntries
SetMapMode
CreateEnhMetaFileW
CombineRgn
SetWindowExtEx
GetTextMetricsW
GetEnhMetaFilePaletteEntries
GetMapMode
SetEnhMetaFileBits
EnumFontsW
AngleArc
RoundRect
RestoreDC
LineTo
ModifyWorldTransform
SetBkColor
ExtSelectClipRgn
SetViewportOrgEx
CreateBitmap
GetCurrentObject
GetEnhMetaFileDescriptionW
FrameRgn
PatBlt
CreateDIBSection
CreateCompatibleBitmap
CreateSolidBrush
PlayEnhMetaFile
GetEnhMetaFileBits
SetROP2
SetDIBits
GetBkColor
PathToRegion
DeleteMetaFile
GetTextExtentExPointW
ExcludeClipRect
DeleteDC
CreateDCW
GetWinMetaFileBits
SetWindowOrgEx
CreateRectRgn
GetStretchBltMode
GetTextColor
CreateICW
CreateRectRgnIndirect
DeleteEnhMetaFile
GetObjectType
GetTextExtentPoint32W
CreateMetaFileW
SelectClipRgn
FillPath
CloseEnhMetaFile
EndDoc
SetDIBColorTable
UnrealizeObject
ExtCreatePen
LPtoDP
MaskBlt
CreateEllipticRgn
GetClipRgn
GetRgnBox
GetWindowOrgEx
BitBlt
PolyBezierTo
Polygon
PtVisible
ResizePalette
Ellipse
ArcTo
SetGraphicsMode
IntersectClipRect
Arc
OffsetRgn
GetRandomRgn
winmm
timeGetTime
sndPlaySoundW
msimg32
GradientFill
Sections
.text Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 324KB - Virtual size: 323KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ