Resubmissions
27-11-2024 09:54
241127-lxb8yavpck 1020-08-2024 14:48
240820-r6q2casajl 1019-12-2023 13:13
231219-qf3rsadcg7 10Analysis
-
max time kernel
30s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 09:54
Behavioral task
behavioral1
Sample
bb.exe
Resource
win10v2004-20241007-en
General
-
Target
bb.exe
-
Size
479KB
-
MD5
b2dc71aeb389c4c5f6b3699163ea1d0f
-
SHA1
578239aefa2c93cae72624754146e8f3e275fa5e
-
SHA256
bb8bbcc948e8dca2e5a0270c41c062a29994a2d9b51e820ed74d9b6e2a01ddcf
-
SHA512
2ac4ebf5ca226384b299167c58aaf4e24ab4a2a4897ef914871803df23794a44a1c9ab638b1714653cd767e566fb5bd0745ebc26f0dc5a3be4e345e6ef5b9461
-
SSDEEP
6144:pTNlPsSiE0grIlHAjNL7SVAtKZnbr8qz6xzS06d17GQxAAXcpGZ5wIzkyOD+lRXs:pFR0gsAjNLJtQbr8w6xely1JcXgDsLm
Malware Config
Extracted
rhadamanthys
https://104.129.128.188:9537/eab5524bf158f61e657/3wdrct36.6fdj7
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Deletes itself 1 IoCs
Processes:
dialer.exepid Process 1772 dialer.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bb.exedialer.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
bb.exedialer.exepid Process 3784 bb.exe 3784 bb.exe 1772 dialer.exe 1772 dialer.exe 1772 dialer.exe 1772 dialer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
bb.exedescription pid Process procid_target PID 3784 wrote to memory of 1772 3784 bb.exe 85 PID 3784 wrote to memory of 1772 3784 bb.exe 85 PID 3784 wrote to memory of 1772 3784 bb.exe 85 PID 3784 wrote to memory of 1772 3784 bb.exe 85 PID 3784 wrote to memory of 1772 3784 bb.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb.exe"C:\Users\Admin\AppData\Local\Temp\bb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1772
-