General

  • Target

    https://e2wuk.app.goo.gl/?link=https://l%252elinklyhq%252ecom/l/24JIg/&apn=com.tracker.asuper.tracker https://ucc7e3672fbb9bf7c46bcde6128b.dl.dropboxusercontent.com/cd/0/get/CkVQnrK3IwTKVRMiaGF53IEoBaVVqvJDZcRcToACXyPonWtOnCzA_ZtY2mNdEG8hlLf1KG7h5TrLqzKYyxSXbfgrESg2keK5cPbNVD0UO4h0MNr7GSZW6oFrTm-KVvjefl-bQXrI_UTGtBn0d5wpKKjt/file?dl=1

  • Sample

    250219-p1v21a1nek

Malware Config

Targets

    • Target

      https://e2wuk.app.goo.gl/?link=https://l%252elinklyhq%252ecom/l/24JIg/&apn=com.tracker.asuper.tracker https://ucc7e3672fbb9bf7c46bcde6128b.dl.dropboxusercontent.com/cd/0/get/CkVQnrK3IwTKVRMiaGF53IEoBaVVqvJDZcRcToACXyPonWtOnCzA_ZtY2mNdEG8hlLf1KG7h5TrLqzKYyxSXbfgrESg2keK5cPbNVD0UO4h0MNr7GSZW6oFrTm-KVvjefl-bQXrI_UTGtBn0d5wpKKjt/file?dl=1

    • Detects Rhadamanthys payload

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Rhadamanthys family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks