Resubmissions

27-11-2024 09:54

241127-lxghnaylhv 10

18-12-2023 21:10

231218-z1gvgsfbg6 10

Analysis

  • max time kernel
    30s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 09:54

General

  • Target

    OSU-FREEDOM-main/freedom.exe

  • Size

    539KB

  • MD5

    32b86751d376ef214a26e50eecc6e67d

  • SHA1

    b6b7a830578cfe154b6c27d18ea7761630bb5363

  • SHA256

    60710a8b3e9d7b6985e6a2eab5c7ed57e2ee776db285ba69cc5b53c36110770f

  • SHA512

    00ee95b52e926173dc8dc85d6a0b21d5eb54e99a91047292be6e761b61bcd467d1551d30715707b67642741803e0c463f64b4ce1a2c72be2d7415b2dffee31f5

  • SSDEEP

    12288:gE50GSHrG6W42JcycysY0V3D9wCV+QnXGwnUP345WRgG3OkGGs/Lwmm:h+GSHrG6W42JcychY0FD9wCVPHw3yeJF

Score
10/10

Malware Config

Extracted

Family

rhadamanthys

C2

https://95.214.55.177:2525/a8ee4140c073de1ec851bc2b/black.api

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2676
      • C:\Windows\system32\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4540
    • C:\Users\Admin\AppData\Local\Temp\OSU-FREEDOM-main\freedom.exe
      "C:\Users\Admin\AppData\Local\Temp\OSU-FREEDOM-main\freedom.exe"
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:68

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/68-7-0x00007FFF61C50000-0x00007FFF61F19000-memory.dmp

      Filesize

      2.8MB

    • memory/68-2-0x0000000003290000-0x0000000003690000-memory.dmp

      Filesize

      4.0MB

    • memory/68-3-0x0000000003290000-0x0000000003690000-memory.dmp

      Filesize

      4.0MB

    • memory/68-5-0x0000000003290000-0x0000000003690000-memory.dmp

      Filesize

      4.0MB

    • memory/68-4-0x00007FFF64150000-0x00007FFF64345000-memory.dmp

      Filesize

      2.0MB

    • memory/68-1-0x0000000003290000-0x0000000003690000-memory.dmp

      Filesize

      4.0MB

    • memory/68-10-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/68-6-0x00007FFF62A90000-0x00007FFF62B4E000-memory.dmp

      Filesize

      760KB

    • memory/68-0-0x0000000000400000-0x000000000049B000-memory.dmp

      Filesize

      620KB

    • memory/4540-11-0x00000242A4180000-0x00000242A4580000-memory.dmp

      Filesize

      4.0MB

    • memory/4540-12-0x00000242A4180000-0x00000242A4580000-memory.dmp

      Filesize

      4.0MB

    • memory/4540-8-0x00000242A26A0000-0x00000242A26A9000-memory.dmp

      Filesize

      36KB

    • memory/4540-15-0x00007FFF61C50000-0x00007FFF61F19000-memory.dmp

      Filesize

      2.8MB

    • memory/4540-16-0x00000242A4180000-0x00000242A4580000-memory.dmp

      Filesize

      4.0MB

    • memory/4540-14-0x00007FFF62A90000-0x00007FFF62B4E000-memory.dmp

      Filesize

      760KB

    • memory/4540-13-0x00007FFF64150000-0x00007FFF64345000-memory.dmp

      Filesize

      2.0MB

    • memory/4540-17-0x00000242A4180000-0x00000242A4580000-memory.dmp

      Filesize

      4.0MB