Behavioral task
behavioral1
Sample
2dc28d09a64add30abbb2db52cce00c16ca3f88a3abe429135f5278e86a20b89.exe
Resource
win10v2004-20241007-en
General
-
Target
2dc28d09a64add30abbb2db52cce00c16ca3f88a3abe429135f5278e86a20b89
-
Size
448KB
-
MD5
8fbe3f7b4ce5f24aa5a398a0f4c62276
-
SHA1
aab06e30dfa8292798dc37a886b3b3f216fbaa99
-
SHA256
2dc28d09a64add30abbb2db52cce00c16ca3f88a3abe429135f5278e86a20b89
-
SHA512
9d9f613578d58eea8f6507d222c24d02c3a8028c2444241031507f26c5bc0119e2677080d4eaf33947d5374e5996d3ed5d48b9797d48721af651044956d9e3c0
-
SSDEEP
6144:nC5hyUR+MhyfUj6qfoFXYfIrvQ/zabJzYbLkBWBXpMcwLbjJgSqtUg83T36XE24r:v+BoFmID/mQmpMcmSSIU16XE2e5L
Malware Config
Extracted
rhadamanthys
https://91.92.253.157:8215/b45c71e9ac60e42309ff71/fcdvdnhh.5qtol
Signatures
-
Rhadamanthys family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2dc28d09a64add30abbb2db52cce00c16ca3f88a3abe429135f5278e86a20b89
Files
-
2dc28d09a64add30abbb2db52cce00c16ca3f88a3abe429135f5278e86a20b89.exe windows:5 windows x86 arch:x86
55ad6bfe47219bd08f4db9b7b6e7d559
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetModuleHandleA
CreateEventA
WaitForSingleObject
CloseHandle
HeapDestroy
GetModuleFileNameW
lstrlenW
HeapFree
MulDiv
GetProcessHeap
HeapAlloc
GetStartupInfoA
user32
GetScrollRange
GetClassInfoExW
GetClassInfoW
FillRect
CharUpperBuffW
DispatchMessageW
KillTimer
EndMenu
PeekMessageW
EndPaint
FrameRect
IsIconic
LoadBitmapW
GetWindowTextW
DestroyWindow
SetScrollPos
DrawMenuBar
GetMenuStringW
DrawIcon
GetClientRect
BeginPaint
DeleteMenu
LoadIconW
CopyImage
ShowCaret
DefFrameProcW
LoadCursorW
RegisterClassW
SetTimer
GetDCEx
CreateMenu
IsZoomed
DrawFocusRect
GetSystemMenu
GetScrollPos
CreateWindowExW
GetMenuItemInfoW
DestroyMenu
GetCursor
DefMDIChildProcW
ReleaseDC
GetScrollInfo
DestroyCursor
EnableWindow
ShowWindow
CreateAcceleratorTableW
InsertMenuW
GetDlgCtrlID
SetMenuItemInfoW
CreateIcon
gdi32
RestoreDC
Polygon
MoveToEx
CreateICW
RectVisible
CreatePalette
GetTextMetricsW
PolyBezierTo
SetRectRgn
CreateDCW
GetWindowOrgEx
ole32
CoInitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoUninitialize
oleaut32
SafeArrayCreate
SafeArrayAccessData
VariantChangeType
SysFreeString
SysAllocStringLen
SafeArrayGetUBound
SafeArrayUnaccessData
SafeArrayGetElement
GetErrorInfo
VariantInit
SysReAllocStringLen
VariantCopy
SafeArrayPtrOfIndex
SafeArrayGetLBound
VariantCopyInd
SafeArrayPutElement
VariantClear
msvcrt
__p__fmode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
memcpy
qsort
wcsrchr
memset
wcschr
__set_app_type
_except_handler3
_controlfp
__p__commode
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 385KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ