Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10v2004-20241007-en
General
-
Target
Loader.exe
-
Size
456KB
-
MD5
2b0c2a69b2615e69ce9b5b65847b2598
-
SHA1
586c543344c0c8ce1ef0cdc630363261042fb6a9
-
SHA256
0843a128cf164e945e6b99bda50a7bdb2a57b82b65965190f8d3620d4a8cfa2c
-
SHA512
089246df82e8e671b9fffe2ee3aba21d41a433ca52fabb848975719ad23b8bb07f4fcc5ac4a6d2e715d9a66df78f7cdb51b9083af01e4b2b04558d4a31d5fbdd
-
SSDEEP
6144:2uWP/BtSnurUylcrGYlnIttxv8HbcLgsd1Gus5psdrvV44dixP+MHDkBYdxtG9+9:2uWP/BZUyoLu8Agsmxwrvejkd2
Malware Config
Extracted
rhadamanthys
https://195.3.223.126:4287/9d0dc091285eb9fbf2e/tafg2rr2.ooowj
Signatures
-
Rhadamanthys family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Loader.exe
Files
-
Loader.exe.exe windows:4 windows x86 arch:x86
Password: infected
eca0c30b65294d02a6c6180a6b323b58
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
HeapSize
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
LCMapStringW
LCMapStringA
InterlockedExchange
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSection
LoadLibraryA
GetCPInfo
GetSystemInfo
GetACP
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
TerminateProcess
TlsGetValue
TlsSetValue
TlsFree
GetLastError
GetCurrentThreadId
SetLastError
TlsAlloc
GetProcAddress
HeapCreate
VirtualQuery
WaitForSingleObject
HeapDestroy
CreateEventW
ExitProcess
WideCharToMultiByte
OutputDebugStringW
CreateFileW
ReadFile
CloseHandle
GetCurrentProcess
MultiByteToWideChar
GetModuleHandleW
InterlockedIncrement
GetModuleFileNameW
lstrlenW
HeapFree
OutputDebugStringA
MulDiv
GetProcessHeap
HeapAlloc
GetOEMCP
GetVersionExA
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
user32
GetClassInfoW
FrameRect
CharUpperBuffW
IsIconic
EnableWindow
DrawIcon
DeleteMenu
SetTimer
CreateAcceleratorTableW
GetSystemMenu
DrawMenuBar
SetMenuItemInfoW
GetWindowTextW
GetDCEx
RegisterClassW
GetMenuItemInfoW
SetScrollPos
FillRect
GetSystemMetrics
GetDC
MsgWaitForMultipleObjectsEx
EndMenu
DestroyCursor
IsZoomed
GetCursor
GetScrollPos
DispatchMessageW
DefFrameProcW
DestroyMenu
ReleaseDC
IsDialogMessageW
GetScrollRange
DefMDIChildProcW
GetMenuStringW
PeekMessageW
CopyImage
ShowCaret
LoadIconW
DrawFocusRect
LoadBitmapW
GetDlgCtrlID
LoadStringW
GetClassInfoExW
DestroyIcon
ShowWindow
EndPaint
PostMessageW
CreateWindowExW
BeginPaint
LoadCursorW
GetClientRect
InsertMenuW
CreateIcon
DestroyWindow
KillTimer
GetScrollInfo
CreateMenu
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
gdi32
Pie
AngleArc
Polygon
CreateSolidBrush
RectVisible
CreateICW
CreatePalette
PolyBezierTo
RoundRect
RestoreDC
GetWindowOrgEx
CreateCompatibleBitmap
MoveToEx
GetTextMetricsW
GetStockObject
SetTextColor
SetAbortProc
SetBkMode
StretchBlt
CreateDCW
GetDeviceCaps
SetRectRgn
GetEnhMetaFileHeader
ole32
OleInitialize
CoUninitialize
OleUninitialize
CoTaskMemFree
CoTaskMemAlloc
IsEqualGUID
CoInitialize
CoCreateInstance
oleaut32
VariantChangeType
SafeArrayPutElement
VariantCopy
VariantClear
SafeArrayGetElement
SafeArrayGetUBound
SysFreeString
GetErrorInfo
VariantInit
SafeArrayPtrOfIndex
SysAllocStringLen
SafeArrayGetLBound
SafeArrayAccessData
VariantCopyInd
SysReAllocStringLen
SafeArrayCreate
SafeArrayUnaccessData
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
winspool.drv
EnumPrintersW
ord203
OpenPrinterW
ClosePrinter
DocumentPropertiesW
Sections
.text Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 324KB - Virtual size: 322KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE