@mctraxer@0
@shutting@0
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_36ba13f7b6dd4a1d2ffba1695c990bca_amadey_karagany_mafia_rhadamanthys_smoke-loader.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2025-03-30_36ba13f7b6dd4a1d2ffba1695c990bca_amadey_karagany_mafia_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
Target
2025-03-30_36ba13f7b6dd4a1d2ffba1695c990bca_amadey_karagany_mafia_rhadamanthys_smoke-loader
Size
10.9MB
MD5
36ba13f7b6dd4a1d2ffba1695c990bca
SHA1
c21b84141dddf4ce114452d600c54a4344734c84
SHA256
083a33ce3a987a07edf0bb6f6632a3a9146e408863bb1bb66a734c1efd68777f
SHA512
c685a98a97e88457c9b3da85d48bbc7e61ddf4413fc875697d0886f062e9dafa4bde53951e68a09adf4f57e0025449eebe7840fba1037096497cbb0cb5270b43
SSDEEP
6144:5rpR8A6n7KzdbpQNU+yyYqrUdE05deEOxO:5rpjqm5lf+yyYVE0PWU
Checks for missing Authenticode signature.
resource |
---|
2025-03-30_36ba13f7b6dd4a1d2ffba1695c990bca_amadey_karagany_mafia_rhadamanthys_smoke-loader |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
WriteConsoleOutputCharacterW
lstrlenA
RtlCaptureContext
DeleteVolumeMountPointA
SetThreadExecutionState
SetCommBreak
GetTickCount
GlobalAlloc
WideCharToMultiByte
SizeofResource
GetSystemWindowsDirectoryA
FindNextVolumeW
IsBadStringPtrW
IsDBCSLeadByte
DisconnectNamedPipe
FindFirstFileExA
EnumSystemCodePagesW
LoadLibraryA
ProcessIdToSessionId
IsWow64Process
BuildCommDCBAndTimeoutsW
SetConsoleCtrlHandler
VirtualProtect
CompareStringA
GetCurrentProcessId
SetupComm
SetVolumeLabelA
GetAtomNameW
HeapReAlloc
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetStdHandle
GetFileType
SetFilePointer
CloseHandle
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
CreateFileA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LoadLibraryW
ReadFile
SetEndOfFile
GetProcessHeap
WriteConsoleW
CreateFileW
EnumServicesStatusA
RegisterEventSourceA
RegQueryValueExW
@mctraxer@0
@shutting@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ