General

  • Target

    Faersafe_setup.exe

  • Size

    62.7MB

  • Sample

    250131-t5j8hstjan

  • MD5

    279a95fafae69357deaea9e7597cb30b

  • SHA1

    5febed4da5b50050861d383b18e1f39da46db117

  • SHA256

    3a3be4d63ea60273d2a4eda55d735e5f5066d564b9512ef0852e075e684bdd46

  • SHA512

    2d051652b0cf40eb38a511f6b9bd4773d8df6c609c46463428c4a16a0fa98aa519c5dfbdd141f6f31c93b3e26e10975ec61423a96f2dee9c23a16b9a227d2e89

  • SSDEEP

    1572864:vzk0qbeCQptPAujM/hqDkJO3Tre6+dupOrmU:vzDqbdQptk5qDgO3ve6+dupOaU

Malware Config

Targets

    • Target

      Faersafe_setup.exe

    • Size

      62.7MB

    • MD5

      279a95fafae69357deaea9e7597cb30b

    • SHA1

      5febed4da5b50050861d383b18e1f39da46db117

    • SHA256

      3a3be4d63ea60273d2a4eda55d735e5f5066d564b9512ef0852e075e684bdd46

    • SHA512

      2d051652b0cf40eb38a511f6b9bd4773d8df6c609c46463428c4a16a0fa98aa519c5dfbdd141f6f31c93b3e26e10975ec61423a96f2dee9c23a16b9a227d2e89

    • SSDEEP

      1572864:vzk0qbeCQptPAujM/hqDkJO3Tre6+dupOrmU:vzDqbdQptk5qDgO3ve6+dupOaU

    • Detects Rhadamanthys payload

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Rhadamanthys family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Target

      $PLUGINSDIR/StdUtils.dll

    • Size

      100KB

    • MD5

      c6a6e03f77c313b267498515488c5740

    • SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

    • SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

    • SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • SSDEEP

      3072:WNuZmJ9TDP3ahD2TF7Rq9cJNPhF9vyHf:WNuZ81zaAFHhF9v

    Score
    3/10
    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

    • SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

    • SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    • SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • SSDEEP

      192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6

    Score
    3/10
    • Target

      Faersafe.exe

    • Size

      155.8MB

    • MD5

      21b2dba93a27ee2755263187503d3a8e

    • SHA1

      25b6fea260fbb28e053d0f5f7209a7f1aad18cb9

    • SHA256

      ff4957a6001fffcb534dd97ec2ee8f869f6deaccb24263beaf953767c404c8ed

    • SHA512

      f1d1df7896d5ebafdbd468b47463aca72eb3e3513245910f0d11bb9b1c2f059e071bab455e97fe8bc868adee66bb8bcea9edc5575e53846da0b6a3e31fa8b338

    • SSDEEP

      1572864:sVU4t/Ct6JMgabao+nh+bw4FlWMZBZHuoM2t52kOUeEbaVO7GJbdHDexdypGT+LY:qYUJkH0sEQ

    • Detects Rhadamanthys payload

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Rhadamanthys family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Target

      LICENSES.chromium.html

    • Size

      7.9MB

    • MD5

      0e3e4362f785aff0b9e1852b1064c0f1

    • SHA1

      a42ccb51e72bdcb5bb905a62efaa28857def3a17

    • SHA256

      bd3ee49a5ab19d15ddc44b421b0bdefce587790786989ae77cf3ddf1e6a2ba8d

    • SHA512

      193b57efc5f5971fbd9e4ea1a80b34aadcc2a814ff49c4c06afe972bf327e98ff0498217a8bdef984b10fdec6e7858a6fb88c0b14936e0c6b404387a426b87f2

    • SSDEEP

      24576:dbTj6ck6f5kVWS6RqLsWN3Omfpe666A6f6X6TTHW9GqpaE:tEx/i

    Score
    3/10
    • Target

      d3dcompiler_47.dll

    • Size

      4.7MB

    • MD5

      2191e768cc2e19009dad20dc999135a3

    • SHA1

      f49a46ba0e954e657aaed1c9019a53d194272b6a

    • SHA256

      7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d

    • SHA512

      5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970

    • SSDEEP

      49152:KCZnRO4XyM53Rkq4ypQqdoRpmruVNYvkaRwvhiD0N+YEzI4og/RfzHLeHTRhFRNc:xG2QCwmHPnog/pzHAo/A6l

    Score
    1/10
    • Target

      ffmpeg.dll

    • Size

      2.7MB

    • MD5

      d5e1f1e9d0ccfe7f21b5c3750b202b4d

    • SHA1

      74144ac93c0c58a9b9288bce5d06814c9a1b1dc2

    • SHA256

      e1ab367644f72ebcdc8eb3fcfe829ff51719559ac2a43a1600e712b16871ad65

    • SHA512

      dcf70d43f1a83c424be99c38e33e520c72115c3d30945980e5e394d460462251bde309e543213b2b08dcbe9769d11d46792e1cc99aa42777fcc34d6f3361a3d2

    • SSDEEP

      49152:EZ2KxYmwFfgQQs0ShPrF0/zO6R0gRhPj3hTUctrRhuwSnKxqgI5IN8N3lzl3hqzb:Aofp1Pyi54wnKxqg4INhhd

    Score
    1/10
    • Target

      libEGL.dll

    • Size

      469KB

    • MD5

      dd78b86b3c92d61c37b44ef5b157cfe0

    • SHA1

      4dcf9ebc3ff5ca552c0e83469b921153b29aea1f

    • SHA256

      e142752e073c0051a0beb963981af70263ed673959515545521a7941d3230838

    • SHA512

      9d071568dc56db2ab93d034d07a11a477aab8ac50d9ea3c4db3ac4866fcd3c2f3002ba7a3f2c55589a9d68463181fc7a03327dc164310d7e80e30cc6f6bf2423

    • SSDEEP

      6144:s4itlpEJVqKqK5Z5UibKsBHI0Sfnx+lXGpeOQHA93GT3sm:s4itlpAqKqK5Z5U+jBolfnjIyG

    Score
    1/10
    • Target

      libGLESv2.dll

    • Size

      7.1MB

    • MD5

      af3792b63af63408a40604184ea6ef7f

    • SHA1

      b4d577e1c7ca0d4d3a34e2edb919cf58e6b62952

    • SHA256

      b0ff1bad8e2f34b12dfcc4b5387bdc042f9bc2f963e11dea1758397ca0e907ea

    • SHA512

      d413c52f7c82dd17f06002f3ca6bc3efcf4e11e88379d989d982b2f9f47b71643971c4988abee2dc1212027b2cea148a8849bcb442dd4dbcd8e26ea892dd7a58

    • SSDEEP

      49152:x2b3imtb1uWsvZRUCXQNMBbGUa/XFfOpvQnDwX+xjA7LAIgRg37QiI+id3pFJs7w:x7RWft4NV+sduHox6gWE5lHaFX

    Score
    1/10
    • Target

      resources/elevate.exe

    • Size

      105KB

    • MD5

      792b92c8ad13c46f27c7ced0810694df

    • SHA1

      d8d449b92de20a57df722df46435ba4553ecc802

    • SHA256

      9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37

    • SHA512

      6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

    • SSDEEP

      3072:1bLnrwQoRDtdMMgSXiFJWcIgUVCfRjV/GrWl:1PrwRhte1XsE1l

    Score
    3/10
    • Target

      vk_swiftshader.dll

    • Size

      5.0MB

    • MD5

      b06a97b925991eac3832437d7db078cd

    • SHA1

      ca32356ba0938ada1233e13795860690712fbc14

    • SHA256

      2df870c1719ab057ea37aa15e3e379360c1dd8eaea2eaa56cb7b026f5ee4f19f

    • SHA512

      e1e61c28a28dfcf15d69e9ccc8e289dfe606b926e21756bbc0f21e15df18d27b1926277ffc2bd6549cdfb17f11d71c2a9353392e58c33557209b781ec32cef9e

    • SSDEEP

      49152:Ab03fn3GIdr1DO1N8jvfWSrvOuyEE0+w7rz77gpxbhk0H4t38mvttDpSHUoeygs4:d3v3xDvRTGVgt38mvt1pSH0adU

    Score
    1/10
    • Target

      vulkan-1.dll

    • Size

      910KB

    • MD5

      d562628f9df56ae61770ffdef79c8d05

    • SHA1

      2423105a960fe0ceb038ca36d6a37638ebd32b6f

    • SHA256

      5789ca1822f3a5a67cd2c24e6ff0307e688b76a2e99831050bdcf8b8d155956d

    • SHA512

      739f9f41d8e3e48dbd20bfecfc5679f38e59b3fc8cb406a77c384fd5146f19efafa1e4f23f15071dbeaa1d0dc71e125966e19fb757fc39e6abe953159669c096

    • SSDEEP

      24576:FoHDVVdrfQ09CPKuy0O0Q6Z5W0DYsHA6g3P0zAk7s+:FuVdrI0GKuy066Z5W0DYsHA6g3P0zAkz

    Score
    1/10
    • Target

      $PLUGINSDIR/nsis7z.dll

    • Size

      424KB

    • MD5

      80e44ce4895304c6a3a831310fbf8cd0

    • SHA1

      36bd49ae21c460be5753a904b4501f1abca53508

    • SHA256

      b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

    • SHA512

      c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

    • SSDEEP

      6144:aUWQQ5O3fz0NG3ucDaEUTWfk+ZA0NrCL/k+uyoyBOX1okfW7w+Pfzqibckl:an5QEG39fPAkrE4yrBOXDfaNbck

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks