General
-
Target
2025-03-30_735cc5cfa2d71079f3d0b9a8f87a0058_amadey_rhadamanthys_smoke-loader
-
Size
280KB
-
Sample
250330-jdr4yavqy3
-
MD5
735cc5cfa2d71079f3d0b9a8f87a0058
-
SHA1
5b3bb99bc216c46729018c54db34eef7feca0a3d
-
SHA256
0ed2c13309ba722ad5f5666c9dfd774fbca0ad58a0b73e1cf230a7e9f77380d9
-
SHA512
841b27b3d8ffa272e1234b11311f3971ed529a3ec3101105fe52a11d480c37f17f39db2c62f889953ef60b6255b84e190358565ea9a5da14a99da4a39d43b3ee
-
SSDEEP
6144:mLlDX3qcxcWKU5um1Vr1LlDX3YfFLkVO8A1X2oA:mxDJ6m1Vr1xD4yMJ1X2oA
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_735cc5cfa2d71079f3d0b9a8f87a0058_amadey_rhadamanthys_smoke-loader.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2025-03-30_735cc5cfa2d71079f3d0b9a8f87a0058_amadey_rhadamanthys_smoke-loader
-
Size
280KB
-
MD5
735cc5cfa2d71079f3d0b9a8f87a0058
-
SHA1
5b3bb99bc216c46729018c54db34eef7feca0a3d
-
SHA256
0ed2c13309ba722ad5f5666c9dfd774fbca0ad58a0b73e1cf230a7e9f77380d9
-
SHA512
841b27b3d8ffa272e1234b11311f3971ed529a3ec3101105fe52a11d480c37f17f39db2c62f889953ef60b6255b84e190358565ea9a5da14a99da4a39d43b3ee
-
SSDEEP
6144:mLlDX3qcxcWKU5um1Vr1LlDX3YfFLkVO8A1X2oA:mxDJ6m1Vr1xD4yMJ1X2oA
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5