General
-
Target
2025-03-30_704245ea86ce3e9c6e7253b951f59b5c_amadey_nymaim_rhadamanthys_smoke-loader
-
Size
1.4MB
-
Sample
250330-jcxm2aszg1
-
MD5
704245ea86ce3e9c6e7253b951f59b5c
-
SHA1
46897e1b9fc6af38d1b7d4df4c1daa081fba6b7f
-
SHA256
d0cd4b16f61ef801ff6b0b57cd4a5d11d8ad204371bd57e7c4f4539ab5fccad5
-
SHA512
786b6e882e15af9243a5467c120b4b9e193884eeacd32faca30ee05ed808b1c0a736d380347ec88036f6f5dd4b94053e299fad926783988ccfbeb2373d854b16
-
SSDEEP
24576:fhrG5gX9qqY7tl96R7VOKjPgRe05OkhCOJDLonUc98hJNDpevFDsz5tJrPQ:fhZtRY73y1j4ReE4m8nR98PVpeszjW
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_704245ea86ce3e9c6e7253b951f59b5c_amadey_nymaim_rhadamanthys_smoke-loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_704245ea86ce3e9c6e7253b951f59b5c_amadey_nymaim_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2025-03-30_704245ea86ce3e9c6e7253b951f59b5c_amadey_nymaim_rhadamanthys_smoke-loader
-
Size
1.4MB
-
MD5
704245ea86ce3e9c6e7253b951f59b5c
-
SHA1
46897e1b9fc6af38d1b7d4df4c1daa081fba6b7f
-
SHA256
d0cd4b16f61ef801ff6b0b57cd4a5d11d8ad204371bd57e7c4f4539ab5fccad5
-
SHA512
786b6e882e15af9243a5467c120b4b9e193884eeacd32faca30ee05ed808b1c0a736d380347ec88036f6f5dd4b94053e299fad926783988ccfbeb2373d854b16
-
SSDEEP
24576:fhrG5gX9qqY7tl96R7VOKjPgRe05OkhCOJDLonUc98hJNDpevFDsz5tJrPQ:fhZtRY73y1j4ReE4m8nR98PVpeszjW
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Pre-OS Boot
1Bootkit
1