General
-
Target
JaffaCakes118_e0745056c058f048f62d5a4793f01d333b6424787d9b749554bd8ef0c601b2e3
-
Size
803.3MB
-
Sample
241224-rrbccazlam
-
MD5
b3eeca164c17ac49a4331b958581a027
-
SHA1
203546af9583d10bbcabaeb6a920b34fc9b6c403
-
SHA256
e0745056c058f048f62d5a4793f01d333b6424787d9b749554bd8ef0c601b2e3
-
SHA512
643e76ca3ecebe59f5093a64e35f486a7b0fba41d21dacc551276724d4f2ce1bf589add02d6c87428672b9f78a5342bb4063e928eae18f8e872bcafe1a9a7a9a
-
SSDEEP
196608:cXhlI9IqtZdoOzESU2oxIqtU6u5rP8g4fVd1HDqEvwtG8KZmX2R:ou9Iq2gGxFtU6tgUVrHuEVtZG2
Behavioral task
behavioral1
Sample
JaffaCakes118_e0745056c058f048f62d5a4793f01d333b6424787d9b749554bd8ef0c601b2e3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e0745056c058f048f62d5a4793f01d333b6424787d9b749554bd8ef0c601b2e3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
#/AnalysesTolerance.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
#/AnalysesTolerance.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
#/Zerus.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
#/Zerus.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
rhadamanthys
https://82.115.223.156:4924/d3a57c7e95391394/necb5kh1.3b9m5
Targets
-
-
Target
JaffaCakes118_e0745056c058f048f62d5a4793f01d333b6424787d9b749554bd8ef0c601b2e3
-
Size
803.3MB
-
MD5
b3eeca164c17ac49a4331b958581a027
-
SHA1
203546af9583d10bbcabaeb6a920b34fc9b6c403
-
SHA256
e0745056c058f048f62d5a4793f01d333b6424787d9b749554bd8ef0c601b2e3
-
SHA512
643e76ca3ecebe59f5093a64e35f486a7b0fba41d21dacc551276724d4f2ce1bf589add02d6c87428672b9f78a5342bb4063e928eae18f8e872bcafe1a9a7a9a
-
SSDEEP
196608:cXhlI9IqtZdoOzESU2oxIqtU6u5rP8g4fVd1HDqEvwtG8KZmX2R:ou9Iq2gGxFtU6tgUVrHuEVtZG2
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
#/AnalysesTolerance.exe
-
Size
615KB
-
MD5
6b0122cc3033b1258c4bc565c73fc7e2
-
SHA1
f9a25511ba54fed2042c589a036cda085acfeb20
-
SHA256
df15ba268f71ac5f302270f9d27983d8b2879a3e67bccf7567d5b99019107654
-
SHA512
ce1b3cc75e300bc0c99a4f9a742fd9700bdbd22539ccf3b67b0d4f24f77b145172fdfa19bf9fbef286067c3c45e6ee0c018de29ed4c68bf0daac3ef2055d0872
-
SSDEEP
12288:QIjqJwukZkvE7S4mUzKri5b2YS1xu+JVAL0IcoY5S+n7Hvl:17NkvBwKr02YcxNJVYY5rn7Pl
Score1/10 -
-
-
Target
#/Zerus.exe
-
Size
805.6MB
-
MD5
5ae9dd65a83740789a41006eb1552b59
-
SHA1
537ac421d0abc0d2582ed8c1b97b7283702d693b
-
SHA256
fa37d8e3ccdcfc1ab0b85536a509bc388181cf86923635ad8c52125878646bcc
-
SHA512
a6a6380cef7e0da0846ab668ec40ed13db9354bd9196abb64a0dbf0448579a36d4aba7e5f18a8968a74eb01123b440e043d683d14b415a90079d6a179e8709ae
-
SSDEEP
196608:CPa8GEvd/s9jv4PrFB7PXXpYAcBXW8VNHY1QVmETwm7ePM:9QPPxBZYAiZVN62mGZePM
Score1/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Discovery
Process Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1