General

  • Target

    start.bat

  • Size

    32B

  • Sample

    250210-r3qleawjc1

  • MD5

    bf24697b5cb868ee7a5ddd4809d45dbc

  • SHA1

    716a502d0392c6bbdc770f4146b995575f259373

  • SHA256

    6e722243696a6525fe5e873b77f5069fd5c6c7e9147d8a69a13675c67211e892

  • SHA512

    91c1f63a4337e19c7009892fe697b476b007e6d554afd5668bfdbb853a0874a6b91567340e87d9c18a58d7b99e059edb61048cf417eff3a7ea02cbfd83771082

Malware Config

Targets

    • Target

      start.bat

    • Size

      32B

    • MD5

      bf24697b5cb868ee7a5ddd4809d45dbc

    • SHA1

      716a502d0392c6bbdc770f4146b995575f259373

    • SHA256

      6e722243696a6525fe5e873b77f5069fd5c6c7e9147d8a69a13675c67211e892

    • SHA512

      91c1f63a4337e19c7009892fe697b476b007e6d554afd5668bfdbb853a0874a6b91567340e87d9c18a58d7b99e059edb61048cf417eff3a7ea02cbfd83771082

    • Detects Rhadamanthys payload

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Rhadamanthys family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Enumerates VirtualBox registry keys

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare services registry key.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks