General
-
Target
https://e2wuk.app.goo.gl/?link=https://l%252elinklyhq%252ecom/l/24JIg/&apn=com.tracker.asuper.tracker https://ucc7e3672fbb9bf7c46bcde6128b.dl.dropboxusercontent.com/cd/0/get/CkVQnrK3IwTKVRMiaGF53IEoBaVVqvJDZcRcToACXyPonWtOnCzA_ZtY2mNdEG8hlLf1KG7h5TrLqzKYyxSXbfgrESg2keK5cPbNVD0UO4h0MNr7GSZW6oFrTm-KVvjefl-bQXrI_UTGtBn0d5wpKKjt/file?dl=1
-
Sample
250219-p1v21a1nek
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://e2wuk.app.goo.gl/?link=https://l%252elinklyhq%252ecom/l/24JIg/&apn=com.tracker.asuper.tracker https://ucc7e3672fbb9bf7c46bcde6128b.dl.dropboxusercontent.com/cd/0/get/CkVQnrK3IwTKVRMiaGF53IEoBaVVqvJDZcRcToACXyPonWtOnCzA_ZtY2mNdEG8hlLf1KG7h5TrLqzKYyxSXbfgrESg2keK5cPbNVD0UO4h0MNr7GSZW6oFrTm-KVvjefl-bQXrI_UTGtBn0d5wpKKjt/file?dl=1
Resource
win11-20250217-en
Malware Config
Targets
-
-
Target
https://e2wuk.app.goo.gl/?link=https://l%252elinklyhq%252ecom/l/24JIg/&apn=com.tracker.asuper.tracker https://ucc7e3672fbb9bf7c46bcde6128b.dl.dropboxusercontent.com/cd/0/get/CkVQnrK3IwTKVRMiaGF53IEoBaVVqvJDZcRcToACXyPonWtOnCzA_ZtY2mNdEG8hlLf1KG7h5TrLqzKYyxSXbfgrESg2keK5cPbNVD0UO4h0MNr7GSZW6oFrTm-KVvjefl-bQXrI_UTGtBn0d5wpKKjt/file?dl=1
Score10/10-
Detects Rhadamanthys payload
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-