Analysis
-
max time kernel
21s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 23:12
Behavioral task
behavioral1
Sample
EulenModMenu-main/Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
EulenModMenu-main/license.dll
Resource
win10v2004-20241007-en
General
-
Target
EulenModMenu-main/Loader.exe
-
Size
479KB
-
MD5
eb580bc45a382527d2f1ff80c542bd9d
-
SHA1
0b95c965fe80c9b9d9270be74817a8771bb02daa
-
SHA256
99bd6ee7da4edad447fba55a6b11538927013586ef617e70a0ff4765adae22db
-
SHA512
a3f4563d4ee61a0bdc612c849f13711af961514cbe3ce48ab9af0b905c8df278f470e902bc50b64d95055f2bd69fd288bba1dd0405caf9e4a42585cdf6b3e23c
-
SSDEEP
6144:pTNlPsSiE0grIlHAjNL7S8AtKZnbr8qz6xzS06d17GQxAAXcpGZ5wIzkyOD+lRXs:pFR0gsAjNL6tQbr8w6xely1JcXgDsLm
Malware Config
Extracted
rhadamanthys
https://95.214.55.177:1689/e21adcd5478c6d21f12/jf923j9f.kd10d2
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Deletes itself 1 IoCs
pid Process 4136 dialer.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1168 Loader.exe 1168 Loader.exe 4136 dialer.exe 4136 dialer.exe 4136 dialer.exe 4136 dialer.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4136 1168 Loader.exe 85 PID 1168 wrote to memory of 4136 1168 Loader.exe 85 PID 1168 wrote to memory of 4136 1168 Loader.exe 85 PID 1168 wrote to memory of 4136 1168 Loader.exe 85 PID 1168 wrote to memory of 4136 1168 Loader.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\EulenModMenu-main\Loader.exe"C:\Users\Admin\AppData\Local\Temp\EulenModMenu-main\Loader.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4136
-